Cisco released a security update to fix a critical vulnerability in the vContainer of the Cisco SD-WAN Solution. A remote authenticated attacker could cause a denial of service (DoS) condition and take control of affected system. Multiple other high severity SD-WAN bugs were also addressed.
The buffer flow vulnerability (CVE-2019-1651) is caused by improper bounds checking by the cContainer.
Cisco described the vulnerability in the security advisory:
“An attacker could exploit this vulnerability by sending a malicious file to an affected vContainer instance. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected vContainer, which could result in a DoS condition that the attacker could use to execute arbitrary code as the root user.”
This vulnerability impacts Cisco-hosted vContainer for the Cisco SD-WAN Solution prior to Release 18.4.0.
Of special note, the CVSS score of this critical vulnerability is rated 9.9 (10 is highest possible).
Twelve other High risk vulnerabilities were also patched for multiple products to include Cisco Webex Teams, SD-WAN, ISE and small business routers, to name a few.
Patching should be a high priority to address these bugs.