Cisco SD-WAN vManage Software Privilege Escalation (cisco-sa-sdwan-privesc-vman-tEJFpBSL)

high Nessus Plugin ID 159722

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco SD-WAN Viptela Software is affected by a vulnerability.

- A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected system as a low-privileged user to exploit this vulnerability. This vulnerability exists because a file leveraged by a root user is executed when a low-privileged user runs specific commands on an affected system. An attacker could exploit this vulnerability by injecting arbitrary commands to a specific file as a lower-privileged user and then waiting until an admin user executes specific commands. The commands would then be executed on the device by the root user. A successful exploit could allow the attacker to escalate their privileges on the affected system from a low-privileged user to the root user. (CVE-2022-20739)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvt11537

See Also

http://www.nessus.org/u?30e783f4

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt11537

Plugin Details

Severity: High

ID: 159722

File Name: cisco-sa-sdwan-privesc-vman-tEJFpBSL.nasl

Version: 1.11

Type: local

Family: CISCO

Published: 4/13/2022

Updated: 9/13/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2022-20739

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:sd-wan_vmanage, cpe:/o:cisco:sd-wan_firmware

Required KB Items: Cisco/Viptela/Version, Cisco/Viptela/Model

Exploit Ease: No known exploits are available

Patch Publication Date: 4/13/2022

Vulnerability Publication Date: 4/13/2022

Reference Information

CVE: CVE-2022-20739

CWE: 269

CISCO-SA: cisco-sa-sdwan-privesc-vman-tEJFpBSL

IAVA: 2022-A-0158-S

CISCO-BUG-ID: CSCvt11537