CVE-2021-1498
- EPSS 94.01%
- Veröffentlicht 06.05.2021 13:15:10
- Zuletzt bearbeitet 28.10.2025 13:58:25
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
Cisco ≫ Hyperflex Hx220c All Nvme M5 Version-
Cisco ≫ Hyperflex Hx220c Edge M5 Version-
Cisco ≫ Hyperflex Hx220c M5 Version-
Cisco ≫ Hyperflex Hx240c Version-
Cisco ≫ Hyperflex Hx240c Af M5 Version-
Cisco ≫ Hyperflex Hx240c M5 Version-
03.11.2021: CISA Known Exploited Vulnerabilities (KEV) Catalog
Cisco HyperFlex HX Data Platform Command Injection Vulnerability
SchwachstelleCisco HyperFlex HX Installer Virtual Machine contains an insufficient input validation vulnerability which could allow an attacker to execute commands on an affected device as the tomcat8 user.
BeschreibungApply updates per vendor instructions.
Erforderliche Maßnahmen| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 94.01% | 0.999 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
| psirt@cisco.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.