ID

VAR-202103-0545


CVE

CVE-2021-1385


TITLE

Cisco IOx  Path Traversal Vulnerability in Applications

Trust: 0.8

sources: JVNDB: JVNDB-2021-005195

DESCRIPTION

A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system. Cisco IOx The application contains a path traversal vulnerability.Information may be obtained and information may be tampered with. Cisco Iox is a secure development environment of the US Cisco (Cisco) that combines Cisco IOS and Linux OS for secure network connection and development of IOT applications. A security vulnerability exists in the Cisco IOx application

Trust: 2.88

sources: NVD: CVE-2021-1385 // JVNDB: JVNDB-2021-005195 // CNVD: CNVD-2021-22452 // CNNVD: CNNVD-202103-1411 // VULHUB: VHN-374439 // VULMON: CVE-2021-1385

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2021-22452

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:17.2.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1y

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.3a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.9\(3\)m2a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.2a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.1w

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.4.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1w

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.2.1v

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.1x

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.8\(3\)m6

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1x

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.9\(3\)m1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.2.1r

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.2.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.1s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.9\(3\)m3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1c

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.2s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.8\(3\)m5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1z

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.1b

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.2t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.4.1b

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1za

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.4.1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.9\(3\)m

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.8\(3\)m4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.2a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.3.1a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1a

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.8\(3\)m3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.4a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.2.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:17.1.1t

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.1z1

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.9\(3\)m2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.4

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.11.1c

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.5

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.3

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.12.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:15.8\(3\)m2a

Trust: 1.0

vendor:シスコシステムズmodel:cisco iosscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:iox applicationscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2021-22452 // JVNDB: JVNDB-2021-005195 // NVD: CVE-2021-1385

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1385
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1385
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1385
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2021-22452
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202103-1411
value: MEDIUM

Trust: 0.6

VULHUB: VHN-374439
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-1385
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-1385
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2021-22452
severity: HIGH
baseScore: 7.7
vectorString: AV:N/AC:L/AU:M/C:C/I:C/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 6.4
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-374439
severity: MEDIUM
baseScore: 6.0
vectorString: AV:N/AC:M/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1385
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.2
impactScore: 5.2
version: 3.1

Trust: 2.0

NVD: CVE-2021-1385
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2021-22452 // VULHUB: VHN-374439 // VULMON: CVE-2021-1385 // JVNDB: JVNDB-2021-005195 // CNNVD: CNNVD-202103-1411 // NVD: CVE-2021-1385 // NVD: CVE-2021-1385

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.1

problemtype:Path traversal (CWE-22) [ others ]

Trust: 0.8

sources: VULHUB: VHN-374439 // JVNDB: JVNDB-2021-005195 // NVD: CVE-2021-1385

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202103-1411

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-202103-1411

PATCH

title:cisco-sa-iox-pt-hWGcPf7gurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-pt-hWGcPf7g

Trust: 0.8

title:Patch for Cisco IOx application directory traversal vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/254871

Trust: 0.6

title:Cisco Iox Repair measures for path traversal vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=145712

Trust: 0.6

title:Cisco: Cisco IOx Application Environment Path Traversal Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-iox-pt-hWGcPf7g

Trust: 0.1

sources: CNVD: CNVD-2021-22452 // VULMON: CVE-2021-1385 // JVNDB: JVNDB-2021-005195 // CNNVD: CNNVD-202103-1411

EXTERNAL IDS

db:NVDid:CVE-2021-1385

Trust: 4.0

db:JVNid:JVNVU94803886

Trust: 0.8

db:ICS CERTid:ICSA-22-300-03

Trust: 0.8

db:JVNDBid:JVNDB-2021-005195

Trust: 0.8

db:CNVDid:CNVD-2021-22452

Trust: 0.6

db:AUSCERTid:ESB-2022.5426

Trust: 0.6

db:CNNVDid:CNNVD-202103-1411

Trust: 0.6

db:VULHUBid:VHN-374439

Trust: 0.1

db:VULMONid:CVE-2021-1385

Trust: 0.1

sources: CNVD: CNVD-2021-22452 // VULHUB: VHN-374439 // VULMON: CVE-2021-1385 // JVNDB: JVNDB-2021-005195 // CNNVD: CNNVD-202103-1411 // NVD: CVE-2021-1385

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-iox-pt-hwgcpf7g

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-1385

Trust: 2.0

url:https://github.com/orangecertcc/security-research/security/advisories/ghsa-hhfw-6cm2-v3w5

Trust: 1.7

url:https://jvn.jp/vu/jvnvu94803886/index.html

Trust: 0.8

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-300-03

Trust: 0.8

url:https://vigilance.fr/vulnerability/cisco-ios-ios-xe-multiple-vulnerabilities-34940

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5426

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2021-22452 // VULHUB: VHN-374439 // VULMON: CVE-2021-1385 // JVNDB: JVNDB-2021-005195 // CNNVD: CNNVD-202103-1411 // NVD: CVE-2021-1385

SOURCES

db:CNVDid:CNVD-2021-22452
db:VULHUBid:VHN-374439
db:VULMONid:CVE-2021-1385
db:JVNDBid:JVNDB-2021-005195
db:CNNVDid:CNNVD-202103-1411
db:NVDid:CVE-2021-1385

LAST UPDATE DATE

2024-08-14T13:24:31.601000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2021-22452date:2021-03-26T00:00:00
db:VULHUBid:VHN-374439date:2022-05-12T00:00:00
db:VULMONid:CVE-2021-1385date:2021-04-07T00:00:00
db:JVNDBid:JVNDB-2021-005195date:2022-10-31T02:57:00
db:CNNVDid:CNNVD-202103-1411date:2022-10-28T00:00:00
db:NVDid:CVE-2021-1385date:2023-11-07T03:28:09.610

SOURCES RELEASE DATE

db:CNVDid:CNVD-2021-22452date:2021-03-26T00:00:00
db:VULHUBid:VHN-374439date:2021-03-24T00:00:00
db:VULMONid:CVE-2021-1385date:2021-03-24T00:00:00
db:JVNDBid:JVNDB-2021-005195date:2021-12-09T00:00:00
db:CNNVDid:CNNVD-202103-1411date:2021-03-24T00:00:00
db:NVDid:CVE-2021-1385date:2021-03-24T20:15:13.837