Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22246: Unauthenticated Command Injection vulnerability in SD-WAN Edge in VMware SD-WAN Edge

0
High
VulnerabilityCVE-2024-22246cvecve-2024-22246
Published: Tue Apr 02 2024 (04/02/2024, 15:48:23 UTC)
Source: CVE Database V5
Product: VMware SD-WAN Edge

Description

VMware SD-WAN Edge contains an unauthenticated command injection vulnerability potentially leading to remote code execution. A malicious actor with local access to the Edge Router UI during activation may be able to perform a command injection attack that could lead to full control of the router.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:13:57 UTC

Technical Analysis

CVE-2024-22246 is an unauthenticated command injection vulnerability identified in VMware SD-WAN Edge devices, specifically versions 4.5.x and 5.x. The vulnerability resides in the Edge Router UI during the activation phase, where a malicious actor with local access can inject arbitrary commands. This injection can lead to remote code execution, granting the attacker full control over the router. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating that input is not properly sanitized before being passed to system commands. The CVSS v3.1 base score is 7.4, reflecting high impact on confidentiality, integrity, and availability, but with an attack vector limited to local access (AV:L), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). Although no exploits are currently known in the wild, the potential for an attacker to gain full control of critical network infrastructure devices is significant. The vulnerability could be exploited during the activation process of the SD-WAN Edge device, which may be a limited window but critical in environments where devices are deployed or reconfigured frequently. The lack of authentication during this phase increases risk, as it allows unauthenticated users with physical or network proximity access to the device to attempt exploitation. This vulnerability highlights the importance of securing device activation procedures and controlling local access to network infrastructure components.

Potential Impact

For European organizations, the impact of CVE-2024-22246 could be severe, particularly for those relying on VMware SD-WAN Edge devices to manage wide area network connectivity and critical business communications. Successful exploitation could lead to full compromise of the affected router, enabling attackers to intercept, modify, or disrupt network traffic, potentially causing data breaches, service outages, or lateral movement within corporate networks. This could affect confidentiality by exposing sensitive data, integrity by allowing manipulation of network traffic or configurations, and availability by disrupting network services. Given the reliance on SD-WAN for digital transformation and remote connectivity, disruption could impact operational continuity and regulatory compliance, especially under GDPR and other data protection frameworks. The requirement for local access somewhat limits the threat to environments where physical or network proximity to the device is possible, such as branch offices or data centers. However, insider threats or attackers gaining initial footholds in these environments could leverage this vulnerability to escalate privileges and control network infrastructure. The absence of known exploits in the wild provides a window for proactive mitigation, but organizations should act swiftly to reduce exposure.

Mitigation Recommendations

1. Restrict physical and network access to VMware SD-WAN Edge devices, especially during activation phases, by implementing strict access control lists and network segmentation. 2. Monitor activation processes closely and log all access attempts to the Edge Router UI to detect anomalous or unauthorized activities. 3. Apply vendor patches or updates as soon as they become available to remediate the vulnerability. 4. If patching is not immediately possible, consider temporarily disabling or restricting the activation interface or using out-of-band management channels with stronger authentication. 5. Conduct regular security audits and penetration testing focusing on device activation workflows and local access controls. 6. Educate staff and administrators about the risks associated with local access during device activation and enforce policies to minimize exposure. 7. Employ network intrusion detection systems (NIDS) to identify suspicious command injection attempts or unusual traffic patterns related to SD-WAN Edge devices. 8. Use endpoint protection and network segmentation to limit the ability of attackers to reach the activation interface from compromised internal hosts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2024-01-08T18:43:03.535Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d789050fe8508ffbf5f

Added to database: 12/16/2025, 4:48:56 PM

Last enriched: 12/23/2025, 5:13:57 PM

Last updated: 2/8/2026, 6:02:23 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats