Rewterz
Rewterz Threat Advisory – CVE-2021-1518 – Cisco Firepower Device Manager Code Execution
July 22, 2021
Rewterz
Rewterz Threat Advisory –Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities
July 22, 2021

Rewterz Threat Advisory –Multiple Cisco SD-WAN Software Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2021-1614

A vulnerability in the Multiprotocol Label Switching (MPLS) packet handling function of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to gain access to information stored in MPLS buffer memory. This vulnerability is due to insufficient handling of malformed MPLS packets that are processed by a device that is running Cisco SD-WAN Software. An attacker could exploit this vulnerability by sending a crafted MPLS packet to an affected device that is running Cisco SD-WAN Software or Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.

CVE-2021-34700

A vulnerability in the CLI interface of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read arbitrary files on the underlying file system of an affected system. This vulnerability exists because access to sensitive information on an affected system is not sufficiently controlled. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the web UI of an affected system.

Impact

  • Information Theft
  • Unauthorized Access

Affected Vendors

Cisco

Affected Products

  • Cisco SD-WAN Software
  • Cisco SD-WAN vManage Earlier than 20.4.2
  • Cisco SD-WAN vManage Earlier than 20.5.1

Remediation

Refer to Cisco Security Advisory for the patch, upgrade, or suggested workaround information.

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-mpls-infodisclos-MSSRFkZq