10
CVE-2021-1497
- EPSS 94.4%
- Veröffentlicht 06.05.2021 13:15:10
- Zuletzt bearbeitet 28.10.2025 13:53:41
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Hyperflex Hx Data Platform Version < 4.0\(2e\)
Cisco ≫ Hyperflex Hx220c Af M5 Version-
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
Cisco ≫ Hyperflex Hx Data Platform Version >= 4.5 < 4.5\(2a\)
Cisco ≫ Hyperflex Hx220c Af M5 Version-
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog
Cisco HyperFlex HX Installer Virtual Machine Command Injection Vulnerability
SchwachstelleCisco HyperFlex HX Installer Virtual Machine contains an insufficient input validation vulnerability which could allow an attacker to execute commands on an affected device as the root user.
BeschreibungApply updates per vendor instructions.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 94.4% | 1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
| psirt@cisco.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.