PatchSiren cyber security CVE debrief
CVE-2018-6961 VMware CVE debrief
CVE-2018-6961 is a VMware SD-WAN Edge by VeloCloud command injection vulnerability that CISA added to its Known Exploited Vulnerabilities catalog. Because it is in the KEV catalog, defenders should treat it as actively exploited and prioritize vendor-guided remediation for any exposed VMware SD-WAN Edge deployments.
- Vendor
- VMware
- Product
- SD-WAN Edge
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-25
- Original CVE updated
- 2022-03-25
- Advisory published
- 2022-03-25
- Advisory updated
- 2022-03-25
Who should care
Organizations that use VMware SD-WAN Edge, especially teams responsible for edge networking appliances, security operations, vulnerability management, and patch deployment.
Technical summary
The supplied source corpus identifies the issue as a command injection vulnerability in VMware SD-WAN Edge by VeloCloud. CISA’s KEV entry marks it as a known exploited vulnerability and directs defenders to apply updates per vendor instructions. No version range, severity score, or further technical detail is provided in the supplied corpus.
Defensive priority
High. CISA has listed this CVE in the Known Exploited Vulnerabilities catalog, which is a strong signal to remediate quickly on any affected systems.
Recommended defensive actions
- Identify all VMware SD-WAN Edge deployments in your environment.
- Apply vendor updates or mitigations according to VMware instructions.
- Prioritize internet-facing or externally reachable SD-WAN Edge systems first.
- Validate that remediation completed successfully and document exposure status.
- Monitor for any signs of unauthorized command execution or device tampering consistent with exploitation.
Evidence notes
The source corpus includes the CISA KEV record for CVE-2018-6961 with vendorProject=VMware, product=SD-WAN Edge, vulnerabilityName='VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability', dateAdded=2022-03-25, dueDate=2022-04-15, and requiredAction='Apply updates per vendor instructions.' The corpus also references the official CVE record and NVD detail page, but provides no CVSS score or affected version range.
Official resources
-
CVE-2018-6961 CVE record
CVE.org
-
CVE-2018-6961 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CISA’s KEV entry for CVE-2018-6961 is dated 2022-03-25, with a due date of 2022-04-15 for remediation per vendor instructions. The supplied corpus does not provide an original vendor disclosure date or publication timeline beyond the KEV/sy