← Volver a CVEs
CVE-2021-1528
HIGH7.8
Descripcion
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/4/2021
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
cisco:catalyst_sd-wan_managercisco:sd-wan_vbond_orchestratorcisco:vedge_100cisco:vedge_1000cisco:vedge_1000_firmwarecisco:vedge_100_firmwarecisco:vedge_100bcisco:vedge_100b_firmwarecisco:vedge_100mcisco:vedge_100m_firmwarecisco:vedge_100wmcisco:vedge_100wm_firmwarecisco:vedge_2000cisco:vedge_2000_firmwarecisco:vedge_5000cisco:vedge_5000_firmwarecisco:vedge_cloudcisco:vedge_cloud_firmwarecisco:vsmart_controller
Debilidades (CWE)
CWE-250
Referencias
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.