A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF | Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF - Vendor Advisory |
14 Jun 2021, 15:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:vsmart_controller:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | CWE-250 | |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF - Vendor Advisory |
04 Jun 2021, 17:59
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-04 17:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1528
Mitre link : CVE-2021-1528
CVE.ORG link : CVE-2021-1528
JSON object : View
Products Affected
cisco
- vedge_2000
- vedge_100m_firmware
- vedge_5000
- sd-wan_vbond_orchestrator
- vedge_100m
- vedge_100
- catalyst_sd-wan_manager
- vsmart_controller
- vedge_1000
- vedge_100_firmware
- vedge_1000_firmware
- vedge_100wm
- vedge_2000_firmware
- vedge_100wm_firmware
- vedge_cloud_firmware
- vedge_100b_firmware
- vedge_5000_firmware
- vedge_cloud
- vedge_100b
CWE
CWE-250
Execution with Unnecessary Privileges