ID

VAR-202101-1059


CVE

CVE-2021-1279


TITLE

plural  Cisco SD-WAN  Buffer error vulnerability in the product

Trust: 0.8

sources: JVNDB: JVNDB-2021-002613

DESCRIPTION

Multiple vulnerabilities in Cisco SD-WAN products could allow an unauthenticated, remote attacker to execute denial of service (DoS) attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco SD-WAN The product contains a buffer error vulnerability.Denial of service (DoS) It may be put into a state. Cisco SD-WAN vEdge is a router from Cisco of the United States. This device can provide basic WAN, security and multi-cloud functions for Cisco SD-WAN solutions. Cisco SD-WAN vManage is a software from Cisco (Cisco) that provides software-defined network functions. This software is a way of network virtualization. Many Cisco SD-WAN products have buffer overflow vulnerabilities. The vulnerability stems from the program's failure to correctly verify and check the input of the SNMPv3 management function

Trust: 2.34

sources: NVD: CVE-2021-1279 // JVNDB: JVNDB-2021-002613 // CNVD: CNVD-2021-73654 // VULHUB: VHN-374333 // VULMON: CVE-2021-1279

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-73654

AFFECTED PRODUCTS

vendor:ciscomodel:ios xe sd-wanscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:20.1.0

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.99

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.1

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wan vsmart controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:sd-wan vbond orchestratorscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.1

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.4.5

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.3.5

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:18.3.8

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.2

Trust: 1.0

vendor:ciscomodel:sd-wanscope:eqversion:19.2.0

Trust: 1.0

vendor:シスコシステムズmodel:cisco sd-wan vbond orchestratorscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wanscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wan vmanagescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ios xe sd-wanscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco sd-wan vsmart controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xe sd-wan softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:sd-wan vedge cloud routersscope: - version: -

Trust: 0.6

vendor:ciscomodel:sd-wan vmanage softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:sd-wan vedge routersscope: - version: -

Trust: 0.6

vendor:ciscomodel:sd-wan vbond orchestrator softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:sd-wan vsmart controller softwarescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-73654 // JVNDB: JVNDB-2021-002613 // NVD: CVE-2021-1279

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1279
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1279
value: HIGH

Trust: 1.0

NVD: CVE-2021-1279
value: HIGH

Trust: 0.8

CNVD: CNVD-2021-73654
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202101-1543
value: HIGH

Trust: 0.6

VULHUB: VHN-374333
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1279
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1279
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-73654
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-374333
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1279
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 2.0

NVD: CVE-2021-1279
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-73654 // VULHUB: VHN-374333 // VULMON: CVE-2021-1279 // JVNDB: JVNDB-2021-002613 // CNNVD: CNNVD-202101-1543 // NVD: CVE-2021-1279 // NVD: CVE-2021-1279

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:CWE-119

Trust: 1.0

problemtype:Buffer error (CWE-119) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-374333 // JVNDB: JVNDB-2021-002613 // NVD: CVE-2021-1279

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202101-1543

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202101-1543

PATCH

title:cisco-sa-sdwan-dosmulti-48jJuEUPurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-dosmulti-48jJuEUP

Trust: 0.8

title:Patch for Buffer overflow vulnerabilities in many Cisco SD-WAN productsurl:https://www.cnvd.org.cn/patchInfo/show/292881

Trust: 0.6

title:Multiple Cisco SD-WAN Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139801

Trust: 0.6

title:Cisco: Cisco SD-WAN Denial of Service Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sdwan-dosmulti-48jJuEUP

Trust: 0.1

sources: CNVD: CNVD-2021-73654 // VULMON: CVE-2021-1279 // JVNDB: JVNDB-2021-002613 // CNNVD: CNNVD-202101-1543

EXTERNAL IDS

db:NVDid:CVE-2021-1279

Trust: 3.2

db:JVNDBid:JVNDB-2021-002613

Trust: 0.8

db:CNVDid:CNVD-2021-73654

Trust: 0.6

db:AUSCERTid:ESB-2021.0241

Trust: 0.6

db:CNNVDid:CNNVD-202101-1543

Trust: 0.6

db:VULHUBid:VHN-374333

Trust: 0.1

db:VULMONid:CVE-2021-1279

Trust: 0.1

sources: CNVD: CNVD-2021-73654 // VULHUB: VHN-374333 // VULMON: CVE-2021-1279 // JVNDB: JVNDB-2021-002613 // CNNVD: CNNVD-202101-1543 // NVD: CVE-2021-1279

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-dosmulti-48jjueup

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-1279

Trust: 2.0

url:https://www.auscert.org.au/bulletins/esb-2021.0241/

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-sd-wan-vedge-five-vulnerabilities-34396

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/195312

Trust: 0.1

sources: CNVD: CNVD-2021-73654 // VULHUB: VHN-374333 // VULMON: CVE-2021-1279 // JVNDB: JVNDB-2021-002613 // CNNVD: CNNVD-202101-1543 // NVD: CVE-2021-1279

SOURCES

db:CNVDid:CNVD-2021-73654
db:VULHUBid:VHN-374333
db:VULMONid:CVE-2021-1279
db:JVNDBid:JVNDB-2021-002613
db:CNNVDid:CNNVD-202101-1543
db:NVDid:CVE-2021-1279

LAST UPDATE DATE

2024-08-14T13:23:53.834000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-73654date:2021-09-26T00:00:00
db:VULHUBid:VHN-374333date:2022-08-05T00:00:00
db:VULMONid:CVE-2021-1279date:2021-01-27T00:00:00
db:JVNDBid:JVNDB-2021-002613date:2021-09-27T09:05:00
db:CNNVDid:CNNVD-202101-1543date:2022-08-08T00:00:00
db:NVDid:CVE-2021-1279date:2023-11-07T03:27:51.480

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-73654date:2021-09-26T00:00:00
db:VULHUBid:VHN-374333date:2021-01-20T00:00:00
db:VULMONid:CVE-2021-1279date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2021-002613date:2021-09-27T00:00:00
db:CNNVDid:CNNVD-202101-1543date:2021-01-20T00:00:00
db:NVDid:CVE-2021-1279date:2021-01-20T20:15:16.253