Executive Summary

Title- Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN by VeloCloud
NameVMSA-2018-0011First vendor Publication2018-05-15
VendorVMwareLast vendor Modification2018-06-28
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


Unauthenticated Command Injection vulnerability in VMware NSX SD-WAN Edge by VeloCloud

VMware NSX SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.

VMware would like to thank Cory Mathews, Quentin Rhoads-Herrera, and Maggie Ligon of Critical Start and security researcher Brian Sullivan from Tevora for independently reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2018-6961 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

Original Source

Url : http://www.vmware.com/security/advisories/VMSA-2018-0011.html

CWE : Common Weakness Enumeration

100 %CWE-77Improper Sanitization of Special Elements used in a Command ('Command Injection')

Alert History

If you want to see full details history, please login or register.
2018-08-10 00:21:28
  • Multiple Updates
2018-06-29 09:18:47
  • First insertion