Sd Wan Vsmart Controller Cisco Sd Wan Vsmart Controller

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cisco Sd Wan Vsmart Controller.

By the Year

In 2026 there have been 0 vulnerabilities in Cisco Sd Wan Vsmart Controller. Sd Wan Vsmart Controller did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 4 7.35

It may take a day or so for new Sd Wan Vsmart Controller vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Sd Wan Vsmart Controller Security Vulnerabilities

Cisco SD-WAN CLI Elevation of Privilege via Improper Access Controls
CVE-2022-20818 7.8 - High - September 30, 2022

Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Path Traversal: '/../filedir'

CVE-2022-20775: Privilege Escalation via Improper CLI Access in Cisco SD-Wan
CVE-2022-20775 7.8 - High - September 30, 2022

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. This vulnerability is due to improper access controls on commands within the application CLI. An attacker could exploit this vulnerability by running a maliciously crafted command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF

Path Traversal: '/../filedir'

Cisco SD-WAN CLI: Auth Local File Overwrite via Insufficient Input Validation
CVE-2022-20930 6.7 - Medium - September 30, 2022

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite and possibly corrupt files on an affected system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary commands that are executed as the root user account. A successful exploit could allow the attacker to overwrite arbitrary system files, which could result in a denial of service (DoS) condition.

Shell injection

Authenticated Local CLI Cmd Injection: Cisco SD-WAN File Delete
CVE-2022-20850 7.1 - High - September 30, 2022

A vulnerability in the CLI of stand-alone Cisco IOS XE SD-WAN Software and Cisco SD-WAN Software could allow an authenticated, local attacker to delete arbitrary files from the file system of an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting arbitrary file path information when using commands in the CLI of an affected device. A successful exploit could allow the attacker to delete arbitrary files from the file system of the affected device.

Improper Input Validation

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Sd Wan Vsmart Controller or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe