{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T18:57:03.468","vulnerabilities":[{"cve":{"id":"CVE-2018-0433","sourceIdentifier":"psirt@cisco.com","published":"2018-10-05T14:29:01.607","lastModified":"2024-11-21T03:38:13.203","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the command-line interface (CLI) in the Cisco SD-WAN Solution could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI utility. The attacker must be authenticated to access the CLI utility. A successful exploit could allow the attacker to execute commands with root privileges."},{"lang":"es","value":"Una vulnerabilidad en la interfaz de línea de comandos (CLI) en Cisco SD-WAN Solution podría permitir que un atacante local autenticado inyecte comandos arbitrarios que se ejecutan con privilegios root. Esta vulnerabilidad se debe a una validación de entradas insuficiente. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y enviando una entrada manipulada a la utilidad CLI. El atacante debe estar autenticado para acceder a la utilidad CLI. Su explotación con éxito podría permitir que el atacante ejecute comandos con privilegios root."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.3.0","matchCriteriaId":"9DA7EC35-E407-451C-A74C-7E56D802B868"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*","matchCriteriaId":"00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.3.0","matchCriteriaId":"BA91A271-08ED-40C9-885B-D2F67BBF2B7E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*","matchCriteriaId":"F019975D-3A45-4522-9CB9-F4258C371DF6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.3.0","matchCriteriaId":"35386A93-1EBF-4347-B916-E915D574AF15"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"140AF13E-4463-478B-AA94-97406A80CB86"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"18.3.0","matchCriteriaId":"BC8AC6B8-A07F-4E52-B2D0-F5EC3061060B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*","matchCriteriaId":"1356861D-E6CA-4973-9597-629507E8C07E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*","matchCriteriaId":"BA648664-0734-4D02-8944-CA4DF4D756D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vedge_cloud_router_platform:-:*:*:*:*:*:*:*","matchCriteriaId":"E8872C5F-974E-4678-80FA-7C3FEC6B533B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vmanage_network_management_system:-:*:*:*:*:*:*:*","matchCriteriaId":"2D9794CD-0EE1-4203-A232-9365D4AEE837"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*","matchCriteriaId":"2F16884C-A2EE-4867-8806-6418E000078C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105295","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-injection","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105295","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180905-sd-wan-injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}