Show plain JSON{"id": "CVE-2021-1495", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.8, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 5.3, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 1.4, "exploitabilityScore": 3.9}]}, "published": "2021-04-29T18:15:09.430", "references": [{"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://www.debian.org/security/2023/dsa-5354", "source": "ykramarz@cisco.com"}, {"url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00011.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.debian.org/security/2023/dsa-5354", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-755"}]}], "descriptions": [{"lang": "en", "value": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP. The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload."}, {"lang": "es", "value": "M\u00faltiples productos de Cisco est\u00e1n afectados por una vulnerabilidad en el motor de detecci\u00f3n Snort que podr\u00eda permitir a un atacante remoto no autenticado omitir una pol\u00edtica de archivos configurada para HTTP. La vulnerabilidad es debido a un manejo incorrecto de par\u00e1metros espec\u00edficos del encabezado HTTP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de paquetes HTTP dise\u00f1ados por medio de un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir una pol\u00edtica de archivos configurada para paquetes HTTP y entregar una carga \u00fatil maliciosa"}], "lastModified": "2024-11-21T05:44:28.830", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAE65CB5-08E5-41B6-9AC0-02451C90E833", "versionEndExcluding": "6.4.0.12"}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04202164-FCC4-413E-90B5-01FE08AC6EEC", "versionEndExcluding": "6.6.4", "versionStartIncluding": "6.5.0"}, {"criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDDF492B-BC61-4814-B05F-3F6CD07080F7", "versionEndExcluding": "6.7.0.2", "versionStartIncluding": "6.7.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3BCB821-CD8E-4D1D-968E-D52715B4CDDE", "versionEndExcluding": "16.12.5", "versionStartIncluding": "16.12"}, {"criteria": "cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3ABE8CC6-FFE8-48D2-B94A-C8AED78AA2D2", "versionEndExcluding": "2.9.17.1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3A8DECA-0833-4207-9EC7-DFC60A7EF1C3", "versionEndExcluding": "17.3.3", "versionStartIncluding": "17.1"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CFEDAF8-A6E8-4F01-B6D5-5099107BF77F", "versionEndExcluding": "17.4.1", "versionStartIncluding": "17.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A6F668B9-2C1D-4306-8286-35E67D0F67C7"}, {"criteria": "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5EB8A757-7888-4AC2-BE44-B89DB83C6C77"}, {"criteria": "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B80890A8-E3D3-462C-B125-9E9BC6525B02"}, {"criteria": "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0547E196-5991-4C33-823A-342542E9DFD3"}, {"criteria": "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16"}, {"criteria": "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97"}, {"criteria": "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D916389F-54DB-44CB-91DD-7CE3C7059350"}, {"criteria": "cpe:2.3:h:cisco:3000_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9B8C4D97-A430-45FB-9EF5-B6E4DBA1BD31"}, {"criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A"}, {"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5"}, {"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD"}, {"criteria": "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E8B60888-6E2B-494E-AC65-83337661EE7D"}, {"criteria": "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CCF17101-9EF9-47BB-B966-0FA9B71AEEFA"}, {"criteria": "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960"}, {"criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5E7E8914-7B25-4097-8B22-6928C1F03D5A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B207857B-C483-47DF-9FC7-6A05B866BF60"}, {"criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7"}, {"criteria": "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9"}, {"criteria": "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "04AB61E9-0148-495E-BD21-64D52DE60A6C"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}