ID

VAR-202103-0542


CVE

CVE-2021-1382


TITLE

Cisco IOS XE SD-WAN  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-004773

DESCRIPTION

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges. Cisco IOS XE SD-WAN Contains a command injection vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco IOS XE SD-WAN Software is a software for network management (software-defined networking) applied to the Cisco IOS XE network operating system from Cisco

Trust: 1.8

sources: NVD: CVE-2021-1382 // JVNDB: JVNDB-2021-004773 // VULHUB: VHN-374436 // VULMON: CVE-2021-1382

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:gteversion:17.5.0

Trust: 1.0

vendor:ciscomodel:ios xescope:gteversion:17.6.0

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:17.6.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:17.3.3

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:17.5.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:gteversion:17.4.1

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:17.4.2

Trust: 1.0

sources: NVD: CVE-2021-1382

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1382
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1382
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1382
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-1415
value: MEDIUM

Trust: 0.6

VULHUB: VHN-374436
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1382
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1382
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-374436
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1382
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1382
baseSeverity: MEDIUM
baseScore: 6.0
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2021-1382
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-374436 // VULMON: CVE-2021-1382 // JVNDB: JVNDB-2021-004773 // CNNVD: CNNVD-202103-1415 // NVD: CVE-2021-1382 // NVD: CVE-2021-1382

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-374436 // JVNDB: JVNDB-2021-004773 // NVD: CVE-2021-1382

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202103-1415

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202103-1415

PATCH

title:cisco-sa-xesdwcinj-t68PPW7murl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m

Trust: 0.8

title:Cisco IOS XE SD-WAN Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145715

Trust: 0.6

title:Cisco: Cisco IOS XE SD-WAN Software Command Injection Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-xesdwcinj-t68PPW7m

Trust: 0.1

sources: VULMON: CVE-2021-1382 // JVNDB: JVNDB-2021-004773 // CNNVD: CNNVD-202103-1415

EXTERNAL IDS

db:NVDid:CVE-2021-1382

Trust: 2.6

db:JVNDBid:JVNDB-2021-004773

Trust: 0.8

db:CNNVDid:CNNVD-202103-1415

Trust: 0.6

db:VULHUBid:VHN-374436

Trust: 0.1

db:VULMONid:CVE-2021-1382

Trust: 0.1

sources: VULHUB: VHN-374436 // VULMON: CVE-2021-1382 // JVNDB: JVNDB-2021-004773 // CNNVD: CNNVD-202103-1415 // NVD: CVE-2021-1382

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-xesdwcinj-t68ppw7m

Trust: 2.5

url:https://github.com/orangecertcc/security-research/security/advisories/ghsa-7xfm-92p7-qc57

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-1382

Trust: 1.4

url:https://vigilance.fr/vulnerability/cisco-ios-ios-xe-multiple-vulnerabilities-34940

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/77.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-374436 // VULMON: CVE-2021-1382 // JVNDB: JVNDB-2021-004773 // CNNVD: CNNVD-202103-1415 // NVD: CVE-2021-1382

SOURCES

db:VULHUBid:VHN-374436
db:VULMONid:CVE-2021-1382
db:JVNDBid:JVNDB-2021-004773
db:CNNVDid:CNNVD-202103-1415
db:NVDid:CVE-2021-1382

LAST UPDATE DATE

2024-08-14T13:43:36.204000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-374436date:2022-09-30T00:00:00
db:VULMONid:CVE-2021-1382date:2021-03-29T00:00:00
db:JVNDBid:JVNDB-2021-004773date:2021-11-29T09:16:00
db:CNNVDid:CNNVD-202103-1415date:2022-04-24T00:00:00
db:NVDid:CVE-2021-1382date:2023-11-07T03:28:09.047

SOURCES RELEASE DATE

db:VULHUBid:VHN-374436date:2021-03-24T00:00:00
db:VULMONid:CVE-2021-1382date:2021-03-24T00:00:00
db:JVNDBid:JVNDB-2021-004773date:2021-11-29T00:00:00
db:CNNVDid:CNNVD-202103-1415date:2021-03-24T00:00:00
db:NVDid:CVE-2021-1382date:2021-03-24T20:15:13.353