A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges.
Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
This vulnerability is currently on the CISA KEV list, which CISA only adds CVEs to when there is reliable evidence of active exploitation in the wild. For federal civilian agencies, BOD 22-01 requires remediation by the due date above. For everyone else, KEV is the strongest "patch immediately" signal you can get from public threat intel.
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Cisco Catalyst SD | WAN — 18.3.1, 19.2.1, 17.2.4, 19.3.0, 18.3.0, 18.3.4, 18.4.303, 18.4.0.1, 17.2.9, 18.3.7, 18.2.0, 17.2.10, 18.4.5, 18.4.0, 17.2.5, 18.3.8, 18.4.4, 18.4.302, 17.2.7, 19.2.098, 20.1.1, 19.2.099, 18.3.3, 18.4.1, 17.2.8, 18.3.5, 19.0.0, 18.4.3, 19.1.0, 17.2.6, 18.3.3.1, 19.2.097, 20.1.1.1, 18.3.6, 19.2.0, 19.2.2, 20.1.11, 20.1.12, 19.1.0a, 19.2.3, 17.3.1ESM1, 20.3.1, 17.3.1ESM2, 17.2.1LA, 20.1.2, 17.3.1ESM3, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 17.3.2ESM1, 20.3.2.1, 18.4.6, 20.4.1, 17.3.2ESM2, 19.2.4, 20.4.1.1, 20.3.3, 20.3.809, 20.3.3.1, 20.5.1, 20.3.811, 20.1.3, 20.4.1.2, 17.4.2.2527, 17.4.2ES1, 17.3.2ESM3, 20.4.2, 20.3.4, 20.6.1, 20.6.1.1, 20.6.2, 20.7.1, 20.4.2.1, 20.3.4.1, 20.5.1.1, 20.6.2.1, 20.3.4.2, 20.4.2.2, 20.6.2.2, 20.5.1.2, 20.7.1.1, 20.3.5, 20.6.3, 20.7.2, 20.6.3.1, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.6.4.1, 20.6.3.2, 20.4.2.3, 20.6.1.2, 20.3.4.3, 20.6.5.2, 20.3.3.2, 20.3.7.1, 20.3.5.1, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.6.4.2, 20.6.5.5, 20.6.3.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
| Cisco | Cisco Catalyst SD | WAN Manager — 20.1.12, 19.2.1, 18.4.4, 18.4.5, 20.1.1.1, 20.1.1, 19.3.0, 19.2.2, 19.2.099, 18.3.6, 18.3.7, 19.2.0, 18.3.8, 19.0.0, 19.1.0, 18.4.302, 18.4.303, 19.2.097, 19.2.098, 17.2.10, 18.3.6.1, 19.0.1a, 18.2.0, 18.4.3, 18.4.1, 17.2.8, 18.3.3.1, 18.4.0, 18.3.1, 17.2.6, 17.2.9, 18.3.4, 17.2.5, 18.3.1.1, 18.3.5, 18.4.0.1, 18.3.3, 17.2.7, 17.2.4, 18.3.0, 19.2.3, 18.4.501_ES, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 20.3.2_925, 20.3.2.1, 20.3.2.1_927, 18.4.6, 20.1.2_937, 20.4.1, 20.3.2_928, 20.3.2_929, 20.4.1.0.1, 20.3.2.1_930, 19.2.4, 20.5.0.1.1, 20.4.1.1, 20.3.3, 19.2.4.0.1, 20.3.2_937, 20.3.3.1, 20.5.1, 20.1.3, 20.3.3.0.4, 20.3.3.1.2, 20.3.3.1.1, 20.4.1.2, 20.3.3.0.2, 20.4.1.1.5, 20.4.1.0.01, 20.4.1.0.02, 20.3.3.1.7, 20.3.3.1.5, 20.5.1.0.1, 20.3.3.1.10, 20.3.3.0.8, 20.4.2, 20.4.2.0.1, 20.3.4, 20.3.3.0.14, 19.2.4.0.8, 19.2.4.0.9, 20.3.4.0.1, 20.3.2.0.5, 20.6.1, 20.5.1.0.2, 20.3.3.0.17, 20.6.1.1, 20.6.0.18.3, 20.3.2.0.6, 20.6.0.18.4, 20.4.2.0.2, 20.3.3.0.16, 20.3.4.0.5, 20.6.1.0.1, 20.3.4.0.6, 20.6.2, 20.7.1EFT2, 20.3.4.0.9, 20.3.4.0.11, 20.4.2.0.4, 20.3.3.0.18, 20.7.1, 20.6.2.1, 20.3.4.1, 20.5.1.1, 20.4.2.1, 20.4.2.1.1, 20.3.4.1.1, 20.3.813, 20.3.4.0.19, 20.4.2.2.1, 20.5.1.2, 20.3.4.2, 20.3.814, 20.4.2.2, 20.6.2.2, 20.3.4.2.1, 20.7.1.1, 20.3.4.1.2, 20.6.2.2.2, 20.3.4.0.20, 20.6.2.2.3, 20.4.2.2.2, 20.3.5, 20.6.2.0.4, 20.4.2.2.3, 20.3.4.0.24, 20.6.2.2.7, 20.6.3, 20.3.4.2.2, 20.4.2.2.4, 20.7.1.0.2, 20.3.5.0.8, 20.3.5.0.9, 20.3.5.0.7, 20.3.6, 20.3.7, 20.3.5.1, 20.3.4.3, 20.3.3.2, 20.3.7.1, 20.3.4.0.25, 20.6.2.2.4, 20.6.1.2, 20.3.4.0.26, 20.3.7.2, 20.3.8 |
| Cisco | Cisco SD | WAN vContainer — 18.4.5, 20.1.12, 18.3.6, 19.2.1, 19.3.0, 20.1.1, 19.2.2, 18.3.8, 18.4.3, 18.4.4, 18.4.302, 19.1.0, 18.4.303, 19.2.0, 19.2.098, 17.2.10, 18.3.7, 18.3.1, 19.2.099, 19.2.097, 18.3.4, 18.2.0, 18.3.5, 18.4.1, 17.2.5, 17.2.7, 17.2.8, 17.2.9, 18.4.0, 17.2.6, 18.3.0, 17.2.4, 18.3.3, 19.2.3, 20.3.1, 20.1.2 |
| Cisco | Cisco SD | WAN vEdge Cloud — 19.2.1, 20.1.12, 18.4.4, 19.3.0, 18.3.8, 19.2.2, 20.1.1, 18.3.6, 18.4.3, 18.4.302, 18.4.5, 18.4.303, 19.2.098, 19.1.0, 17.2.10, 19.0.1a, 19.2.099, 18.3.7, 19.2.097, 18.3.1, 19.2.0, 17.2.9, 18.3.4, 18.2.0, 18.4.1, 17.2.5, 18.4.0, 18.3.5, 18.3.3, 17.2.7, 17.2.6, 17.2.8, 18.3.0, 17.2.4, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.4.2.3, 20.3.4.3, 20.6.4.1, 20.6.3.2, 20.3.5.1, 20.6.5.2, 20.3.7.1, 20.3.3.2, 20.6.1.2, 20.1.3.1, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
| Cisco | Cisco SD | WAN vEdge Router — 18.4.303, 18.3.7, 19.3.0, 18.2.0, 20.1.12, 19.2.099, 17.2.10, 18.3.3, 18.3.6, 19.0.0, 17.2.6, 18.4.0, 19.1.01, 19.2.098, 18.3.1, 18.4.302, 19.2.2, 18.3.5, 17.2.9, 19.1.0, 20.1.11, 19.2.097, 18.4.5, 17.2.5, 17.2.8, 18.3.8, 18.3.0, 18.4.3, 18.4.4, 19.2.1, 17.2.4, 18.3.4, 19.0.1a, 20.1.1, 17.2.7, 18.4.1, 19.2.0, 19.2.3, 20.3.1, 20.1.2, 19.2.929, 19.2.31, 20.3.2, 19.2.32, 18.4.6, 20.4.1, 19.2.4, 20.4.1.1, 20.3.3, 20.5.1, 20.1.3, 20.4.1.2, 20.4.2, 20.3.4, 20.6.1, 20.6.2, 20.7.1, 20.7.1.2, 20.3.5, 20.6.3, 20.7.2, 20.6.4, 20.3.6, 20.6.5, 20.3.7, 20.6.5.1, 20.3.3.2, 20.6.4.1, 20.6.3.2, 20.3.4.3, 20.6.5.2, 20.3.7.1, 20.3.5.1, 20.6.1.2, 20.6.5.3, 20.6.3.3, 20.3.7.2, 20.6.5.4, 20.3.8, 20.6.6, 20.6.7, 20.6.8 |
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection: