CVE-2018-6961
high-risk
Published 2018-06-11
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
Do I need to act?
!
93.6% chance of exploitation in next 30 days
EPSS score — higher than 6% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Products (1)
Affected Vendors
References (9)
Broken Link
http://www.securityfocus.com/bid/104185
Broken Link
http://www.securitytracker.com/id/1041210
Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2018-0011.html
Broken Link
http://www.securityfocus.com/bid/104185
Broken Link
http://www.securitytracker.com/id/1041210
Vendor Advisory
http://www.vmware.com/security/advisories/VMSA-2018-0011.html
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-...
63
/ 100
high-risk
Severity
24/34 · High
Exploitability
34/34 · Critical
Exposure
5/34 · Minimal