Description

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to create or overwrite arbitrary files on an affected device, which could result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation for specific commands. An attacker could exploit this vulnerability by including crafted arguments to those specific commands. A successful exploit could allow the attacker to create or overwrite arbitrary files on the affected device, which could result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

INFO

Published Date :

2024-11-18T16:05:35.221Z

Last Modified :

2024-11-18T16:23:51.429Z

Source :

cisco
AFFECTED PRODUCTS

The following products are affected by CVE-2020-26071 vulnerability.

Vendors Products
Cisco
  • Catalyst Sd-wan Manager
  • Sd-wan
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2020-26071.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact