Vulnerability Name: | CVE-2021-1382 (CCN-198733) | ||||||||||||
Assigned: | 2020-11-13 | ||||||||||||
Published: | 2021-03-24 | ||||||||||||
Updated: | 2022-09-30 | ||||||||||||
Summary: | A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges. | ||||||||||||
CVSS v3 Severity: | 6.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-78 CWE-77 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-1382 Source: XF Type: UNKNOWN cisco-cve20211382-commad-exec(198733) Source: MISC Type: Exploit, Third Party Advisory https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 Source: CCN Type: Cisco Security Advisory cisco-sa-xesdwcinj-t68PPW7m Cisco IOS XE SD-WAN Software Command Injection Vulnerability Source: CISCO Type: Vendor Advisory 20210324 Cisco IOS XE SD-WAN Software Command Injection Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |