7.8
CVE-2021-1528
- EPSS 0.06%
- Veröffentlicht 04.06.2021 17:15:09
- Zuletzt bearbeitet 21.11.2024 05:44:33
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Catalyst Sd-wan Manager Version >= 20.4 < 20.4.2
Cisco ≫ Catalyst Sd-wan Manager Version >= 20.5 < 20.5.1
Cisco ≫ Sd-wan Vbond Orchestrator Version >= 20.4 < 20.4.2
Cisco ≫ Sd-wan Vbond Orchestrator Version >= 20.5 < 20.5.1
Cisco ≫ Vsmart Controller Version >= 20.4 < 20.4.2
Cisco ≫ Vsmart Controller Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 100 Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 100 Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 1000 Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 1000 Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 100b Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 100b Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 100m Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 100m Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 100wm Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 100wm Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 2000 Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 2000 Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 5000 Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 5000 Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge 100b Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge 100b Firmware Version >= 20.5 < 20.5.1
Cisco ≫ Vedge Cloud Firmware Version >= 20.4 < 20.4.2
Cisco ≫ Vedge Cloud Firmware Version >= 20.5 < 20.5.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.146 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
psirt@cisco.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-250 Execution with Unnecessary Privileges
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.