Lucene search

K
cve[email protected]CVE-2021-1419
HistorySep 23, 2021 - 3:15 a.m.

CVE-2021-1419

2021-09-2303:15:07
CWE-284
web.nvd.nist.gov
35
2
cve-2021-1419
vulnerability
cisco
access points
ssh
management
local user
file modification
escalated privileges
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.

Affected configurations

NVD
Node
ciscoaironet_1542d_firmwareMatch-
AND
ciscoaironet_1542dMatch-
Node
ciscoaironet_1562d_firmwareMatch-
AND
ciscoaironet_1562dMatch-
Node
ciscoaironet_1815m_firmwareMatch-
AND
ciscoaironet_1815mMatch-
Node
ciscoaironet_1830e_firmwareMatch-
AND
ciscoaironet_1830eMatch-
Node
ciscoaironet_1840i_firmwareMatch-
AND
ciscoaironet_1840iMatch-
Node
ciscoaironet_1850e_firmwareMatch-
AND
ciscoaironet_1850eMatch-
Node
ciscoaironet_2800i_firmwareMatch-
AND
ciscoaironet_2800iMatch-
Node
ciscoaironet_3800p_firmwareMatch-
AND
ciscoaironet_3800pMatch-
Node
ciscoaironet_4800_firmwareMatch-
AND
ciscoaironet_4800Match-
Node
ciscocatalyst_9105axi_firmwareMatch-
AND
ciscocatalyst_9105axiMatch-
Node
ciscocatalyst_9115axe_firmwareMatch-
AND
ciscocatalyst_9115axeMatch-
Node
ciscocatalyst_9117_firmwareMatch-
AND
ciscocatalyst_9117axiMatch-
Node
ciscocatalyst_9120axi_firmwareMatch-
AND
ciscocatalyst_9120axiMatch-
Node
ciscocatalyst_9124axd_firmwareMatch-
AND
ciscocatalyst_9124axdMatch-
Node
ciscocatalyst_9130axe_firmwareMatch-
AND
ciscocatalyst_9130axeMatch-
Node
ciscocatalyst_iw6300_ac_firmwareMatch-
AND
ciscocatalyst_iw6300_acMatch-
Node
ciscoesw6300_firmwareMatch-
AND
ciscoesw6300Match-
Node
cisco1100-8p_firmwareMatch-
AND
cisco1100-8pMatch-
Node
cisco1120_firmwareMatch-
AND
cisco1120Match-
Node
cisco1160_firmwareMatch-
AND
cisco1160_integrated_services_routerMatch-
Node
ciscowireless_lan_controller_softwareRange8.108.10.151.0
Node
ciscocatalyst_9800_firmwareRange16.1216.12.6
OR
ciscocatalyst_9800_firmwareRange17.317.3.3
OR
ciscocatalyst_9800_firmwareMatch17.4
AND
ciscocatalyst_9800-lMatch-
Node
ciscoaironet_1542i_firmwareMatch-
AND
ciscoaironet_1542iMatch-
Node
ciscocatalyst_9800_firmwareRange16.1216.12.6
OR
ciscocatalyst_9800_firmwareRange17.317.3.3
OR
ciscocatalyst_9800_firmwareMatch17.4
AND
ciscocatalyst_9800-clMatch-
Node
ciscocatalyst_9800_firmwareRange16.1216.12.6
OR
ciscocatalyst_9800_firmwareRange17.317.3.3
OR
ciscocatalyst_9800_firmwareMatch17.4
AND
ciscocatalyst_9800-40Match-
Node
ciscocatalyst_9800_firmwareRange16.1216.12.6
OR
ciscocatalyst_9800_firmwareRange17.317.3.3
OR
ciscocatalyst_9800_firmwareMatch17.4
AND
ciscocatalyst_9800-80Match-
Node
ciscoaironet_1562e_firmwareMatch-
AND
ciscoaironet_1562eMatch-
Node
ciscoaironet_1562i_firmwareMatch-
AND
ciscoaironet_1562iMatch-
Node
ciscoaironet_1815w_firmwareMatch-
AND
ciscoaironet_1815wMatch-
Node
ciscoaironet_1815t_firmwareMatch-
AND
ciscoaironet_1815tMatch-
Node
ciscoaironet_1815i_firmwareMatch-
AND
ciscoaironet_1815iMatch-
Node
ciscoaironet_1830i_firmwareMatch-
AND
ciscoaironet_1830iMatch-
Node
ciscoaironet_1850i_firmwareMatch-
AND
ciscoaironet_1850iMatch-
Node
ciscoaironet_2800e_firmwareMatch-
AND
ciscoaironet_2800eMatch-
Node
ciscoaironet_3800i_firmwareMatch-
AND
ciscoaironet_3800iMatch-
Node
ciscoaironet_3800e_firmwareMatch-
AND
ciscoaironet_3800eMatch-
Node
ciscocatalyst_9105axw_firmwareMatch-
AND
ciscocatalyst_9105axwMatch-
Node
ciscocatalyst_9115axi_firmwareMatch-
AND
ciscocatalyst_9115axiMatch-
Node
ciscocatalyst_9120axp_firmwareMatch-
AND
ciscocatalyst_9120axpMatch-
Node
ciscocatalyst_9120axe_firmwareMatch-
AND
ciscocatalyst_9120axeMatch-
Node
ciscocatalyst_9124axi_firmwareMatch-
AND
ciscocatalyst_9124axiMatch-
Node
ciscocatalyst_9130axi_firmwareMatch-
AND
ciscocatalyst_9130axiMatch-
Node
ciscocatalyst_iw6300_dc_firmwareMatch-
AND
ciscocatalyst_iw6300_dcMatch-
Node
ciscocatalyst_iw6300_dcw_firmwareMatch-
AND
ciscocatalyst_iw6300_dcwMatch-

CNA Affected

[
  {
    "product": "Cisco Wireless LAN Controller (WLC) ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2021-1419