Critical Vulnerabilities Patched in Cisco SD-WAN, DNA Center Products
Cisco on Wednesday released patches for several critical and high-severity vulnerabilities affecting its SD-WAN, DNA Center, TelePresence, StarOS, RV router, Prime Service Catalog, and Meeting Server products.
According to Cisco, the Digital Network Architecture (DNA) Center is affected by a critical vulnerability that allows a network attacker to bypass authentication and access critical internal services.
The company’s SD-WAN solution, specifically its command-line interface (CLI), is affected by a critical flaw that can be exploited by a local attacker to elevate privileges to root and change the system configuration.
SD-WAN is also affected by a high-severity vulnerability that allows privilege escalation through the vManage web-based user interface. The same product has also been found to be impacted by a high-severity issue that allows a remote, authenticated attacker to execute commands with root privileges.
A “high” severity rating has also been assigned to denial-of-service (DoS) issues in the StarOS operating system and several RV routers. These weaknesses can be exploited remotely without authentication.
Other high-severity vulnerabilities patched by Cisco this week include cross-site request forgery (CSRF) in the Prime Service Catalog software, and command injections in Meeting Server and some TelePresence software.
Cisco has also fixed over a dozen medium-severity issues in Wide Area Application Services, RV routers, Prime Service Catalog, Prime Infrastructure Virtual Domain, Integrated Management Controller, Email Security Appliance, Security Manager, and Enterprise Chat and Email.
Cisco says it has seen no evidence that any of these flaws have been exploited for malicious purposes. Many of the security holes were discovered by Cisco itself during internal security testing.