CVE-2021-1497

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx220c_all_nvme_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx220c_edge_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx220c_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx240c:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx240c_af_m5:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:hyperflex_hx240c_m5:-:*:*:*:*:*:*:*

History

25 Jul 2024, 17:32

Type Values Removed Values Added
CPE cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\(2a\):*:*:*:*:*:*:* cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*

07 Jun 2021, 20:57

Type Values Removed Values Added
References (MISC) http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html - (MISC) http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry

04 Jun 2021, 16:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html -

Information

Published : 2021-05-06 13:15

Updated : 2024-07-25 17:32


NVD link : CVE-2021-1497

Mitre link : CVE-2021-1497

CVE.ORG link : CVE-2021-1497


JSON object : View

Products Affected

cisco

  • hyperflex_hx220c_af_m5
  • hyperflex_hx240c
  • hyperflex_hx240c_af_m5
  • hyperflex_hx240c_m5
  • hyperflex_hx220c_edge_m5
  • hyperflex_hx220c_all_nvme_m5
  • hyperflex_hx220c_m5
  • hyperflex_hx_data_platform
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')