CVE-2021-1432 Detail

Current Description

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

View Analysis Description

Analysis Description

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (‘Injection’) NIST  
CWE-20 Improper Input Validation Cisco Systems, Inc.  

Change History

2 change records found show changes

Initial Analysis 3/29/2021 4:5:51 PM

Action Type Old Value New Value
Added CPE Configuration Record truncated, showing 500 of 1348 characters.
View Entire Change Record

OR
     *cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe
Added CVSS V2
NIST (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V2 Metadata
Victim must voluntarily interact with attack mechanism
Added CVSS V3.1
NIST AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Added CWE
NIST CWE-74
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 Vendor Advisory

CVE Modified by Cisco Systems, Inc. 3/24/2021 5:15:13 PM

Action Type Old Value New Value
Changed Description Record truncated, showing 500 of 654 characters.
View Entire Change Record

 A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability.
 This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The 
Record truncated, showing 500 of 649 characters.
View Entire Change Record

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The com

Quick Info

CVE Dictionary Entry:
CVE-2021-1432
NVD Published Date:
03/24/2021
NVD Last Modified:
03/29/2021
Source:
Cisco Systems, Inc.