CVE-2021-1451 Detail

Current Description

A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.

View Analysis Description

Analysis Description

A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer Cisco Systems, Inc.  

Change History

2 change records found show changes

Initial Analysis 3/29/2021 2:48:13 PM

Action Type Old Value New Value
Added CPE Configuration Record truncated, showing 500 of 3019 characters.
View Entire Change Record

AND
     OR
          *cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*
          *cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:
Added CVSS V2
NIST (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw Vendor Advisory

CVE Modified by Cisco Systems, Inc. 3/24/2021 5:15:14 PM

Action Type Old Value New Value
Changed Description Record truncated, showing 500 of 898 characters.
View Entire Change Record

 A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device.
 The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerabili
Record truncated, showing 500 of 893 characters.
View Entire Change Record

A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability 

Quick Info

CVE Dictionary Entry:
CVE-2021-1451
NVD Published Date:
03/24/2021
NVD Last Modified:
03/29/2021
Source:
Cisco Systems, Inc.