VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104185 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041210 | Third Party Advisory VDB Entry |
http://www.vmware.com/security/advisories/VMSA-2018-0011.html | Vendor Advisory |
https://www.exploit-db.com/exploits/44959/ | Exploit VDB Entry Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-06-11 22:29
Updated : 2019-10-03 00:03
NVD link : CVE-2018-6961
Mitre link : CVE-2018-6961
CVE.ORG link : CVE-2018-6961
JSON object : View
Products Affected
vmware
- nsx_sd-wan_by_velocloud
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')