Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.
References
Link | Resource |
---|---|
https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r | Exploit Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwpinj-V4weeqzU | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 May 2022, 14:35
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/orangecertcc/security-research/security/advisories/GHSA-vw54-f9mw-g46r - Exploit, Third Party Advisory |
22 Apr 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-03-24 20:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-1383
Mitre link : CVE-2021-1383
CVE.ORG link : CVE-2021-1383
JSON object : View
Products Affected
cisco
- ios_xe_sd-wan
- ios_xe