PatchSiren

PatchSiren cyber security CVE debrief

CVE-2018-6961 VMware CVE debrief

CVE-2018-6961 is a VMware SD-WAN Edge by VeloCloud command injection vulnerability that CISA added to its Known Exploited Vulnerabilities catalog. Because it is in the KEV catalog, defenders should treat it as actively exploited and prioritize vendor-guided remediation for any exposed VMware SD-WAN Edge deployments.

Vendor
VMware
Product
SD-WAN Edge
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-25
Original CVE updated
2022-03-25
Advisory published
2022-03-25
Advisory updated
2022-03-25

Who should care

Organizations that use VMware SD-WAN Edge, especially teams responsible for edge networking appliances, security operations, vulnerability management, and patch deployment.

Technical summary

The supplied source corpus identifies the issue as a command injection vulnerability in VMware SD-WAN Edge by VeloCloud. CISA’s KEV entry marks it as a known exploited vulnerability and directs defenders to apply updates per vendor instructions. No version range, severity score, or further technical detail is provided in the supplied corpus.

Defensive priority

High. CISA has listed this CVE in the Known Exploited Vulnerabilities catalog, which is a strong signal to remediate quickly on any affected systems.

Recommended defensive actions

  • Identify all VMware SD-WAN Edge deployments in your environment.
  • Apply vendor updates or mitigations according to VMware instructions.
  • Prioritize internet-facing or externally reachable SD-WAN Edge systems first.
  • Validate that remediation completed successfully and document exposure status.
  • Monitor for any signs of unauthorized command execution or device tampering consistent with exploitation.

Evidence notes

The source corpus includes the CISA KEV record for CVE-2018-6961 with vendorProject=VMware, product=SD-WAN Edge, vulnerabilityName='VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability', dateAdded=2022-03-25, dueDate=2022-04-15, and requiredAction='Apply updates per vendor instructions.' The corpus also references the official CVE record and NVD detail page, but provides no CVSS score or affected version range.

Official resources

CISA’s KEV entry for CVE-2018-6961 is dated 2022-03-25, with a due date of 2022-04-15 for remediation per vendor instructions. The supplied corpus does not provide an original vendor disclosure date or publication timeline beyond the KEV/sy