-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2079
       Multiple vulnerabilities have been identified in Cisco SD-WAN
                               19 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Cisco SD-WAN
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Root Compromise                 -- Existing Account      
                   Execute Arbitrary Code/Commands -- Existing Account      
                   Overwrite Arbitrary Files       -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-0351 CVE-2018-0350 CVE-2018-0349
                   CVE-2018-0348 CVE-2018-0347 CVE-2018-0346
                   CVE-2018-0345 CVE-2018-0344 CVE-2018-0343
                   CVE-2018-0342  

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-fo
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdnjct
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-coinj
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-cmd-inject
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cx
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-bo
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sd-wan-code-ex
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-cmdinj
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-ci
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-sdwan-dos

Comment: This bulletin contains ten (10) Cisco Systems security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Cisco SD-WAN Solution Arbitrary File Overwrite Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-fo
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69852
CSCvi69856
 
CVE-2018-0349
 
CWE-20
 
CVSS Score:
Base 8.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
CVE-2018-0349
 
CWE-20

Summary

    A vulnerability in the Cisco SD-WAN Solution could allow an authenticated,
    remote attacker to overwrite arbitrary files on the underlying operating
    system of an affected device.

    The vulnerability is due to improper input validation of the request
    admin-tech command in the CLI of the affected software. An attacker could
    exploit this vulnerability by modifying the request admin-tech command in
    the CLI of an affected device. A successful exploit could allow the
    attacker to overwrite arbitrary files on the underlying operating system of
    an affected device and escalate their privileges to the root user.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-fo

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:
      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond, vEdge Cloud, and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vEdge 100, 1000, and 2000 Series Routers

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > vEdge Router >
        vEdge Router Model
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vEdge 18.3.0  Upgrade Image for vEdge 100b, vEdge 100m, vEdge
        1000, vEdge 2000 Routers

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

    Note: The software for Cisco vEdge 5000 Series Routers can be downloaded
    from the Viptela Customer Support Portal.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-fo

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---

Cisco SD-WAN Solution CLI Command Injection Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-cmdnjct
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69866
 
CVE-2018-0348
 
CWE-77
 
CVSS Score:
Base 7.2
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0348
 
CWE-77

Summary

    A vulnerability in the CLI of the Cisco SD-WAN Solution could allow an
    authenticated, remote attacker to inject arbitrary commands that are
    executed with root privileges.

    The vulnerability is due to insufficient input validation. An attacker
    could exploit this vulnerability by authenticating to the device and
    submitting malicious input to the load command within the VPN subsystem.

    The attacker must be authenticated to access the affected CLI parameter. A
    successful exploit could allow an attacker to execute commands with root 
    privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cmdnjct

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:
      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond, vEdge Cloud, and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vEdge 100, 1000, and 2000 Series Routers

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > vEdge Router >
        vEdge Router Model
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vEdge 18.3.0  Upgrade Image for vEdge 100b, vEdge 100m, vEdge
        1000, vEdge 2000 Routers

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

    Note: The software for Cisco vEdge 5000 Series Routers can be downloaded
    from the Viptela Customer Support Portal.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cmdnjct

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco SD-WAN Solution Command Injection Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-coinj
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69751
 
CVE-2018-0351
 
CWE-77
 
CVSS Score:
Base 7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0351
 
CWE-77

Summary

  o A vulnerability in the command-line tcpdump utility in the Cisco SD-WAN
    Solution could allow an authenticated, local attacker to inject arbitrary
    commands that are executed with root privileges.

    The vulnerability is due to insufficient input validation. An attacker
    could exploit this vulnerability by authenticating to the device and
    submitting crafted input to the tcpdump utility.

    The attacker must be authenticated to access the tcpdump utility. A
    successful exploit could allow the attacker to execute commands with root 
    privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-coinj

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond, vEdge Cloud, and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vEdge 100, 1000, and 2000 Series Routers

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > vEdge Router >
        vEdge Router Model
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vEdge 18.3.0 Upgrade Image for vEdge 100b, vEdge 100m, vEdge
        1000, vEdge 2000 Routers

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

    Note: The software for Cisco vEdge 5000 Series Routers can be downloaded
    from the Viptela Customer Support Portal.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-coinj

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco SD-WAN Solution Command Injection Vulnerability

Medium
Advisory ID:
cisco-sa-20180718-sd-wan-cmd-inject
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69974
 
CVE-2018-0344
 
CWE-77
 
CVSS Score:
Base 4.7
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
CVE-2018-0344
 
CWE-77

Summary

    A vulnerability in the vManage dashboard for the configuration and
    management service of the Cisco SD-WAN Solution could allow an
    authenticated, remote attacker to inject and execute arbitrary commands
    with vmanage user privileges on an affected system.

    The vulnerability is due to insufficient input validation of data
    parameters for certain fields in the affected solution. An attacker could
    exploit this vulnerability by configuring a malicious username on the login
    page of the affected solution. A successful exploit could allow the
    attacker to inject and execute arbitrary commands with vmanage user
    privileges on an affected system.

    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-cmd-inject

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software
    For more information about affected software releases, consult the Cisco
    bug ID(s) at the top of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-cmd-inject

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco SD-WAN Solution Configuration and Management Database Remote Code
Execution Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-cx
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69937
 
CVE-2018-0345
 
CWE-20
 
CVSS Score:
Base 8.8
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0345
 
CWE-20

Summary

    A vulnerability in the configuration and management database of the Cisco
    SD-WAN Solution could allow an authenticated, remote attacker to execute
    arbitrary commands with the privileges of the vmanage user in the
    configuration management system of the affected software.

    The vulnerability is due to insufficient validation of command arguments
    that are passed to the configuration and management database of the
    affected software. An attacker could exploit this vulnerability by creating
    custom functions that contain malicious code and are executed as the
    vmanage user of the configuration management system. A successful exploit
    could allow the attacker to execute arbitrary commands  with the privileges
    of the vmanage user in the configuration management system of the affected
    software.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cx

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cx

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

- ---
Cisco SD-WAN Solution Local Buffer Overflow Vulnerability

Medium
Advisory ID:
cisco-sa-20180718-sd-wan-bo
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi70003
 
CVE-2018-0342
 
CWE-119
 
CVSS Score:
Base 6.7
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0342
 
CWE-119
 
Summary

  o A vulnerability in the configuration and monitoring service of the
    Cisco SD-WAN Solution could allow an authenticated, local attacker to
    execute arbitrary code with root privileges or cause a denial of service 
    (DoS) condition on an affected device.

    The vulnerability is due to incomplete bounds checks for data that is
    provided by the configuration and monitoring service of the affected
    solution. An attacker could exploit this vulnerability by sending malicious
    data to the vDaemon listening service on an affected device. A successful
    exploit could allow the attacker to cause a buffer overflow condition on
    the affected device, which could allow the attacker to execute arbitrary
    code with root privileges on the device or cause the vDaemon listening
    service to reload and result in a DoS condition on the device.

    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-bo

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software

    For more information about affected software releases, consult the Cisco
    bug ID(s) at the top of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-bo

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco SD-WAN Solution Remote Code Execution Vulnerability

Medium
Advisory ID:
cisco-sa-20180718-sd-wan-code-ex
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69976
 
CVE-2018-0343
 
CWE-284
 
CVSS Score:
Base 6.3
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
CVE-2018-0343
 
CWE-284

Summary

    A vulnerability in the configuration and management service of the
    Cisco SD-WAN Solution could allow an authenticated, remote attacker to
    execute arbitrary code with vmanage user privileges or cause a denial of
    service (DoS) condition on an affected system.

    The vulnerability is due to insufficient access restrictions to the HTTP
    management interface of the affected solution. An attacker could exploit
    this vulnerability by sending a malicious HTTP request to the affected
    management service through an authenticated device. A successful exploit
    could allow the attacker to execute arbitrary code with vmanage user
    privileges or stop HTTP services on an affected system.

    There are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-code-ex

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software
    For more information about affected software releases, consult the Cisco
    bug ID(s) at the top of this advisory.

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sd-wan-code-ex

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---
Cisco SD-WAN Solution VPN Subsystem Command Injection Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-cmdinj
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69808
CSCvi69810
CSCvi69814
CSCvi69808,CSCvi69810,CSCvi69814,CSCvi69822,CSCvi69827,CSCvi69828,CSCvi69836
CVE-2018-0350
 
CWE-77
 
CVSS Score:
Base 7.2
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0350
 
CWE-77

Summary

  o A vulnerability in the VPN subsystem configuration in the Cisco SD-WAN
    Solution could allow an authenticated, remote attacker to inject arbitrary
    commands that are executed with root privileges.

    The vulnerability is due to insufficient input validation. An attacker
    could exploit this vulnerability by authenticating to the device and
    submitting crafted input to the affected parameter in a web page.

    The attacker must be authenticated to access the affected parameter. A
    successful exploit could allow the attacker to execute commands with root 
    privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cmdinj

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers
      - vEdge Cloud Router Platform
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond, vEdge Cloud, and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vEdge 100, 1000, and 2000 Series Routers

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > vEdge Router >
        vEdge Router Model
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vEdge 18.3.0 Upgrade Image for vEdge 100b, vEdge 100m, vEdge
        1000, vEdge 2000 Routers

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

    Note: The software for Cisco vEdge 5000 Series Routers can be downloaded
    from the Viptela Customer Support Portal.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-cmdinj

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---

Cisco SD-WAN Solution Zero Touch Provisioning Command Injection Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-ci
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69906
 
CVE-2018-0347
 
CWE-77
 
CVSS Score:
Base 7.8
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
CVE-2018-0347
 
CWE-77

Summary

    A vulnerability in the Zero Touch Provisioning (ZTP) subsystem of the Cisco
    SD-WAN Solution could allow an authenticated, local attacker to inject
    arbitrary commands that are executed with root privileges.

    The vulnerability is due to insufficient input validation. An attacker
    could exploit this vulnerability by authenticating to the device and
    submitting malicious input to the affected parameter.

    The attacker must be authenticated to access the affected parameter. A
    successful exploit could allow an attacker to execute commands with root 
    privileges.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-ci

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:
      - vEdge 100 Series Routers
      - vEdge 1000 Series Routers
      - vEdge 2000 Series Routers
      - vEdge 5000 Series Routers

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following location:

    vEdge 100, 1000, and 2000 Series Routers

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > vEdge Router >
        vEdge Router Model
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vEdge 18.3.0  Upgrade Image for vEdge 100b, vEdge 100m, vEdge
        1000, vEdge 2000 Routers

    Note: The software for Cisco vEdge 5000 Series Routers can be downloaded
    from the Viptela Customer Support Portal.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-ci

Revision History

    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- ---

Cisco SD-WAN Solution Zero Touch Provisioning Denial of Service Vulnerability

High
Advisory ID:
cisco-sa-20180718-sdwan-dos
First Published:
2018 July 18 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCvi69914
 
CVE-2018-0346
 
CWE-119
 
CVSS Score:
Base 7.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
CVE-2018-0346
 
CWE-119
 
Summary

  o A vulnerability in the Zero Touch Provisioning service of the Cisco SD-WAN
    Solution could allow an unauthenticated, remote attacker to cause a denial
    of service (DoS) condition on an affected device.

    The vulnerability is due to incorrect bounds checks for certain values in
    packets that are sent to the Zero Touch Provisioning service of the
    affected software. An attacker could exploit this vulnerability by sending
    malicious packets to the affected software for processing. When the
    software processes the packets, a buffer overflow condition could occur and
    cause an affected device to reload. A successful exploit could allow the
    attacker to cause a temporary DoS condition while the device reloads.

    This vulnerability can be exploited only by traffic that is destined for an
    affected device. It cannot be exploited by traffic that is transiting a
    device.

    Cisco has released software updates that address this vulnerability. There
    are no workarounds that address this vulnerability.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-dos

Affected Products

  o Vulnerable Products

    This vulnerability affects the following Cisco products if they are running
    a release of the Cisco SD-WAN Solution prior to Release 18.3.0:

      - vBond Orchestrator Software
      - vManage Network Management Software
      - vSmart Controller Software

    Products Confirmed Not Vulnerable

    Only products listed in the Vulnerable Products section of this advisory
    are known to be affected by this vulnerability.

Workarounds

  o There are no workarounds that address this vulnerability.

Fixed Software

  o Cisco has released free software updates that address the vulnerability
    described in this advisory. Customers may only install and expect support
    for software versions and feature sets for which they have purchased a
    license. By installing, downloading, accessing, or otherwise using such
    software upgrades, customers agree to follow the terms of the Cisco
    software license:
    https://www.cisco.com/c/en/us/products/end-user-license-agreement.html

    Additionally, customers may only download software for which they have a
    valid license, procured from Cisco directly, or through a Cisco authorized
    reseller or partner. In most cases this will be a maintenance upgrade to
    software that was previously purchased. Free security software updates do
    not entitle customers to a new software license, additional software
    feature sets, or major revision upgrades.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

    Customers Without Service Contracts

    Customers who purchase directly from Cisco but do not hold a Cisco service
    contract and customers who make purchases through third-party vendors but
    are unsuccessful in obtaining fixed software through their point of sale
    should obtain upgrades by contacting the Cisco TAC:
    https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html

    Customers should have the product serial number available and be prepared
    to provide the URL of this advisory as evidence of entitlement to a free
    upgrade.

    Fixed Releases

    This vulnerability is fixed in Release 18.3.0 of the Cisco SD-WAN Solution.

    The software can be downloaded from the Software Center on Cisco.com by
    clicking Browse all and navigating to the following locations:

    vBond and vSmart

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vSmart, vEdge Cloud and vBond 18.3.0 upgrade image

    vManage Network Management Software

     1. Navigate to Routers > Software-Defined WAN (SD-WAN) > SD-WAN > SD-WAN
        Software Update
     2. From the left panel, click 18.3.0 under Latest Release
     3. Choose vManage 18.3.0 upgrade image

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerability that is
    described in this advisory.

Source

  o This vulnerability was found during internal security testing.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/
    cisco-sa-20180718-sdwan-dos

Revision History

  o 
    +----------+----------------------------+----------+---------+----------------+
    | Version  |        Description         | Section  | Status  |      Date      |
    +----------+----------------------------+----------+---------+----------------+
    | 1.0      | Initial public release.    | --        | Final   | 2018-July-18   |
    +----------+----------------------------+----------+---------+----------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XvaS
-----END PGP SIGNATURE-----