This article is more than 1 year old

It's 2021 and you can hijack a Cisco SD-WAN deployment with malicious IP traffic and a buffer overflow. Patch now

And also fix up these other holes that can be exploited via HTTP requests, SQL injection, etc

Cisco this week emitted patches for four sets of critical-severity security holes in its products along with other fixes.

The worst of the bugs can be exploited by sending specially crafted IP packets to a vulnerable installation, and overflowing a memory buffer to ultimately execute code as root on the machine, allowing the box to be completely commandeered. Another set of flaws can be abused by sending HTTP requests that trigger arbitrary command execution to again hijack the machine. You should install updates to address these vulnerabilities as soon as possible.

Here's a quick list:

Cisco SD-WAN Buffer Overflow Vulnerabilities (CVE-2021-1300, CVE-2021-1301): Systems running the Cisco SD-WAN software – such as SD-WAN vEdge Routers – can be exploited "by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed." A successful attack can result in the execution of arbitrary code on the underlying operating system with root privileges, which means you basically hand over the gear to a stranger. No authentication is needed; you just have to be able to send traffic to the software.

That's the 1300 bug. The 1301 can be exploited by an authenticated user to knock out a vulnerable machine. According to Cisco, "due to insufficient input validation of user-supplied input that is read by the system during the establishment of an SSH connection," a hacker could submit a maliciously crafted file, overflow a buffer, and denial-of-service the box. Both holes were found by Switchzilla's James Spadaro during internal security testing.

Cisco SD-WAN Command Injection Vulnerabilities (CVE-2021-1260, CVE-2021-1261, CVE-2021-1262, CVE-2021-1263, CVE-2021-1298, CVE-2021-1299): These can be exploited by authenticated users to gain root-level privileges on a system running the vulnerable software. This can be achieved via the command-line interface, the tcpdump command, a device template file, and a single-sign-on configuration file. These programming blunders were discovered through a mix of diagnosing customer support tickets and internal security testing at Cisco.

Cisco DNA Center Command Runner Command Injection Vulnerability (CVE-2021-1264): An authenticated remote user can supply a maliciously "crafted input during command execution or via a crafted command runner API call. A successful exploit could allow the attacker to execute arbitrary CLI commands on devices managed by Cisco DNA Center." It was found during an internal security audit.

Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities (CVE-2021-1138, CVE-2021-1139, CVE-2021-1140, CVE-2021-1141, CVE-2021-1142): These bugs can be exploited to run arbitrary commands on a vulnerable installation by sending specially crafted HTTP requests to the web interface. Bugs 1139 and 1141 require authentication and will run the commands as root, and the others require none at all and will run the commands as a high-privilege account. They were found during an internal security audit.

Cisco believes none of the above are being exploited in the wild. Switchzilla also patched a bunch of other vulnerabilities, such as a Cisco Secure Web Appliance privilege escalation flaw (CVE-2020-3367); Cisco SD-WAN vManage authorization bypass vulnerabilities (CVE-2021-1302, CVE-2021-1304, CVE-2021-1305); and Cisco Data Center Network Manager SQL Injection Vulnerabilities (CVE-2021-1247, CVE-2021-1248). ®


Similar topics


Send us news

Other stories you might like