CVE-2020-26071

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated local attackers on Cisco SD-WAN devices to create or overwrite arbitrary files through insufficient input validation in CLI commands. This could lead to denial of service conditions by corrupting critical system files. Only users with local CLI access on affected Cisco SD-WAN devices are impacted.

💻 Affected Systems

Products:
  • Cisco SD-WAN Software
Versions: Versions prior to 20.3.1, 20.4.1, and 20.5.1
Operating Systems: Cisco SD-WAN OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable if running affected software versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through file corruption leading to persistent DoS, requiring device reimaging or replacement.

🟠

Likely Case

Local authenticated attacker causes service disruption by overwriting configuration or system files, resulting in temporary DoS.

🟢

If Mitigated

No impact if proper access controls prevent unauthorized local access and commands are validated.

🌐 Internet-Facing: LOW - Requires local CLI access, not directly exploitable over network.
🏢 Internal Only: HIGH - Local authenticated attackers (including compromised accounts) can exploit this to cause DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated CLI access but exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 20.3.1, 20.4.1, 20.5.1 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vsoln-arbfile-gtsEYxns

Restart Required: Yes

Instructions:

1. Download appropriate fixed version from Cisco Software Center. 2. Backup current configuration. 3. Upgrade to fixed version following Cisco SD-WAN upgrade procedures. 4. Verify upgrade completion and functionality.

🔧 Temporary Workarounds

No workarounds available

all

Cisco states there are no workarounds for this vulnerability

🧯 If You Can't Patch

  • Restrict local CLI access to only authorized administrators using RBAC
  • Monitor and audit CLI command usage for suspicious file manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check SD-WAN software version with 'show version' command and compare to affected versions

Check Version:

show version | include Version

Verify Fix Applied:

Verify version is 20.3.1, 20.4.1, 20.5.1 or later using 'show version' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns with file path arguments
  • Multiple failed file operations in system logs
  • Unexpected file creation/modification events

Network Indicators:

  • N/A - local exploitation only

SIEM Query:

source="cisco_sdwan" AND (event_type="cli_command" AND command CONTAINS "file" AND arguments CONTAINS "/" OR "..")

🔗 References

📤 Share & Export