Cisco Patches Critical Flaws in SD-WAN, HyperFlex HX Products
Cisco on Wednesday released patches to address tens of vulnerabilities across its product portfolio, including critical flaws in SD-WAN software and the HyperFlex HX data platform.
Two critical vulnerabilities were patched in the SD-WAN vManage software, alongside three high-severity issues. The bugs are not dependent on one another and their exploitation doesn’t require exploitation of the others.
One of the critical flaws (CVE-2021-1468, CVSS score 9.8) could allow unauthenticated, remote attackers to call privileged actions and even create new administrative accounts, thus being able to view, change, or delete data. The second critical bug (CVE-2021-1505, CVSS score 9.1) impacts the web-based management interface of SD-WAN vManage and could allow attackers to gain elevated privileges.
The high-severity issues in SD-WAN vManage could be exploited to gain elevated privileges (CVE-2021-1508), to cause a denial of service condition (CVE-2021-1275), or gain unauthorized access to services (CVE-2021-1506).
Cisco says there are no workarounds for these vulnerabilities. Affected products include IOS XE SD-WAN, SD-WAN vEdge routers, SD-WAN vBond Orchestrator, SD-WAN vEdge cloud routers, and SD-WAN vSmart Controller software.
On Wednesday, Cisco also announced patches for a critical flaw in the web-based management interface of the HyperFlex HX installer virtual machine, which could lead to executing commands as root. Tracked as CVE-2021-1497, the flaw carries a CVSS score of 9.8 and was patched along a high-severity issue (CVE-2021-1498, CVSS score 7.3) that also leads to command injection attacks.
Multiple other high-severity vulnerabilities were patched in SD-WAN, Small Business 100, 300, and 500 series routers, Enterprise NFV Infrastructure Software (NFVIS), Unified Communications Manager IM & Presence Service, and AnyConnect Secure Mobility Client for Windows. Cisco also released fixes for various medium-severity bugs in SD-WAN and other products.
Details on all of these vulnerabilities can be found on Cisco’s security portal. The company says it is not aware of these flaws being exploited in attacks.