ID

VAR-202104-0877


CVE

CVE-2021-1479


TITLE

Cisco SD-WAN vManage Software Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-456

DESCRIPTION

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory. Cisco SD-WAN vManage Software is a management software for SD-WAN (Software Defined Wide Area Network) solutions from Cisco

Trust: 1.08

sources: NVD: CVE-2021-1479 // VULHUB: VHN-374533 // VULMON: CVE-2021-1479

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst sd-wan managerscope:ltversion:20.4.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:gteversion:20.4

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:20.3.3

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:gteversion:19.3

Trust: 1.0

vendor:ciscomodel:sd-wan vmanagescope:ltversion:19.2.4

Trust: 1.0

sources: NVD: CVE-2021-1479

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1479
value: CRITICAL

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1479
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202104-456
value: CRITICAL

Trust: 0.6

VULHUB: VHN-374533
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1479
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1479
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-374533
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1479
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1479
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-374533 // VULMON: CVE-2021-1479 // CNNVD: CNNVD-202104-456 // NVD: CVE-2021-1479 // NVD: CVE-2021-1479

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-374533 // NVD: CVE-2021-1479

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202104-456

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202104-456

PATCH

title:Cisco SD-WAN vManage Software Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147037

Trust: 0.6

title:Cisco: Cisco SD-WAN vManage Software Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-vmanage-YuTVWqy

Trust: 0.1

title:Threatposturl:https://threatpost.com/zero-day-bug-soho-routers/165321/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/cisco-fixes-bug-allowing-remote-code-execution-with-root-privileges/

Trust: 0.1

sources: VULMON: CVE-2021-1479 // CNNVD: CNNVD-202104-456

EXTERNAL IDS

db:NVDid:CVE-2021-1479

Trust: 1.8

db:CNNVDid:CNNVD-202104-456

Trust: 0.7

db:AUSCERTid:ESB-2021.1163

Trust: 0.6

db:SEEBUGid:SSVID-99203

Trust: 0.1

db:VULHUBid:VHN-374533

Trust: 0.1

db:VULMONid:CVE-2021-1479

Trust: 0.1

sources: VULHUB: VHN-374533 // VULMON: CVE-2021-1479 // CNNVD: CNNVD-202104-456 // NVD: CVE-2021-1479

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-vmanage-yutvwqy

Trust: 1.9

url:https://www.auscert.org.au/bulletins/esb-2021.1163

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-1479

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/zero-day-bug-soho-routers/165321/

Trust: 0.1

sources: VULHUB: VHN-374533 // VULMON: CVE-2021-1479 // CNNVD: CNNVD-202104-456 // NVD: CVE-2021-1479

SOURCES

db:VULHUBid:VHN-374533
db:VULMONid:CVE-2021-1479
db:CNNVDid:CNNVD-202104-456
db:NVDid:CVE-2021-1479

LAST UPDATE DATE

2024-08-14T15:17:17.310000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-374533date:2021-04-20T00:00:00
db:VULMONid:CVE-2021-1479date:2021-04-20T00:00:00
db:CNNVDid:CNNVD-202104-456date:2021-04-21T00:00:00
db:NVDid:CVE-2021-1479date:2023-11-07T03:28:24.437

SOURCES RELEASE DATE

db:VULHUBid:VHN-374533date:2021-04-08T00:00:00
db:VULMONid:CVE-2021-1479date:2021-04-08T00:00:00
db:CNNVDid:CNNVD-202104-456date:2021-04-07T00:00:00
db:NVDid:CVE-2021-1479date:2021-04-08T04:15:14.047