CVE-2021-1451 Detail
Current Description
A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.
Analysis Description
A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.
Severity
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].
Weakness Enumeration
CWE-ID | CWE Name | Source |
---|---|---|
CWE-119 | Improper Restriction of Operations within the Bounds of a Memory Buffer | Cisco Systems, Inc. |
Change History
2 change records found show changes
Initial Analysis 3/29/2021 2:48:13 PM
Action | Type | Old Value | New Value |
---|---|---|---|
Added | CPE Configuration | Record truncated, showing 500 of 3019 characters. View Entire Change Record AND OR *cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:* *cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*: |
|
Added | CVSS V2 |
NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C) |
|
Added | CVSS V3.1 |
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
Changed | Reference Type |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw No Types Assigned |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw Vendor Advisory |
CVE Modified by Cisco Systems, Inc. 3/24/2021 5:15:14 PM
Action | Type | Old Value | New Value |
---|---|---|---|
Changed | Description | Record truncated, showing 500 of 898 characters. View Entire Change Record A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerabili |
Record truncated, showing 500 of 893 characters. View Entire Change Record A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability |
Quick Info
CVE Dictionary Entry:
CVE-2021-1451
NVD Published Date:
03/24/2021
NVD Last Modified:
03/29/2021
Source:
Cisco Systems, Inc.