4.9
CVE-2021-1233
- EPSS 0.06%
- Published 20.01.2021 21:15:11
- Last modified 21.11.2024 05:43:53
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to access sensitive information on an affected device. The vulnerability is due to insufficient input validation of requests that are sent to the iperf tool. An attacker could exploit this vulnerability by sending a crafted request to the iperf tool, which is included in Cisco SD-WAN Software. A successful exploit could allow the attacker to obtain any file from the filesystem of an affected device.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Sd-wan Firmware Version < 18.4.3
Cisco ≫ Vedge 100 Router Version-
Cisco ≫ Vedge 1000 Router Version-
Cisco ≫ Vedge 100b Router Version-
Cisco ≫ Vedge 100m Router Version-
Cisco ≫ Vedge 100wm Router Version-
Cisco ≫ Vedge 2000 Router Version-
Cisco ≫ Vedge 5000 Router Version-
Cisco ≫ Vedge Cloud Router Version-
Cisco ≫ Vedge 1000 Router Version-
Cisco ≫ Vedge 100b Router Version-
Cisco ≫ Vedge 100m Router Version-
Cisco ≫ Vedge 100wm Router Version-
Cisco ≫ Vedge 2000 Router Version-
Cisco ≫ Vedge 5000 Router Version-
Cisco ≫ Vedge Cloud Router Version-
Cisco ≫ Catalyst Sd-wan Manager Version-
Cisco ≫ Sd-wan Vbond Orchestrator Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.151 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
nvd@nist.gov | 4.9 | 3.9 | 6.9 |
AV:L/AC:L/Au:N/C:C/I:N/A:N
|
psirt@cisco.com | 4.4 | 0.8 | 3.6 |
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.