Lucene search

K
cvelistCiscoCVELIST:CVE-2021-34766
HistoryOct 06, 2021 - 7:45 p.m.

CVE-2021-34766 Cisco Smart Software Manager Privilege Escalation Vulnerability

2021-10-0619:45:53
CWE-269
cisco
www.cve.org
2
cisco
software manager
privilege escalation
vulnerability
authenticated
remote attacker
records
settings

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

8.8

Confidence

High

EPSS

0.003

Percentile

68.6%

A vulnerability in the web UI of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and create, read, update, or delete records and settings in multiple functions. This vulnerability is due to insufficient authorization of the System User and System Operator role capabilities. An attacker could exploit this vulnerability by directly accessing a web resource. A successful exploit could allow the attacker to create, read, update, or delete records and settings in multiple functions without the necessary permissions on the web UI.

CNA Affected

[
  {
    "product": "Cisco Smart Software Manager On-Prem",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

AI Score

8.8

Confidence

High

EPSS

0.003

Percentile

68.6%

Related for CVELIST:CVE-2021-34766