ID

VAR-202105-0628


CVE

CVE-2021-1447


TITLE

Cisco AsyncOS for Cisco Content Security Management Appliance  Vulnerability in privilege management

Trust: 0.8

sources: JVNDB: JVNDB-2021-006609

DESCRIPTION

A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. This appliance is mainly used to manage all policies, reports, audit information, etc. of email and web security appliances

Trust: 2.34

sources: NVD: CVE-2021-1447 // JVNDB: JVNDB-2021-006609 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-374501 // VULMON: CVE-2021-1447

AFFECTED PRODUCTS

vendor:ciscomodel:content security management appliancescope:ltversion:13.8.1-068

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:ltversion:12.8.1-002

Trust: 1.0

vendor:ciscomodel:content security management appliancescope:gteversion:13.0.0-249

Trust: 1.0

vendor:シスコシステムズmodel:cisco コンテンツ セキュリティ管理アプライアンス ソフトウェアscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco コンテンツ セキュリティ管理アプライアンス ソフトウェアscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco コンテンツ セキュリティ管理アプライアンス ソフトウェアscope:eqversion:cisco content security management appliance software

Trust: 0.8

sources: JVNDB: JVNDB-2021-006609 // NVD: CVE-2021-1447

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-1447
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2021-1447
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1447
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202105-196
value: MEDIUM

Trust: 0.6

VULHUB: VHN-374501
value: HIGH

Trust: 0.1

VULMON: CVE-2021-1447
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2021-1447
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-374501
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-1447
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2021-1447
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-374501 // VULMON: CVE-2021-1447 // JVNDB: JVNDB-2021-006609 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-196 // NVD: CVE-2021-1447 // NVD: CVE-2021-1447

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:Improper authority management (CWE-269) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-374501 // JVNDB: JVNDB-2021-006609 // NVD: CVE-2021-1447

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202105-196

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-196

PATCH

title:cisco-sa-sma-priv-esc-JJ8zxQsCurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sma-priv-esc-JJ8zxQsC

Trust: 0.8

title:Cisco Content Security Management Appliance Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=149226

Trust: 0.6

title:Cisco: Cisco Content Security Management Appliance Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-sma-priv-esc-JJ8zxQsC

Trust: 0.1

sources: VULMON: CVE-2021-1447 // JVNDB: JVNDB-2021-006609 // CNNVD: CNNVD-202105-196

EXTERNAL IDS

db:NVDid:CVE-2021-1447

Trust: 3.4

db:JVNDBid:JVNDB-2021-006609

Trust: 0.8

db:CNNVDid:CNNVD-202105-196

Trust: 0.7

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021050612

Trust: 0.6

db:AUSCERTid:ESB-2021.1551

Trust: 0.6

db:VULHUBid:VHN-374501

Trust: 0.1

db:VULMONid:CVE-2021-1447

Trust: 0.1

sources: VULHUB: VHN-374501 // VULMON: CVE-2021-1447 // JVNDB: JVNDB-2021-006609 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-196 // NVD: CVE-2021-1447

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sma-priv-esc-jj8zxqsc

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-1447

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021050612

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1551

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-content-security-management-appliance-privilege-escalation-35264

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-374501 // VULMON: CVE-2021-1447 // JVNDB: JVNDB-2021-006609 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202105-196 // NVD: CVE-2021-1447

SOURCES

db:VULHUBid:VHN-374501
db:VULMONid:CVE-2021-1447
db:JVNDBid:JVNDB-2021-006609
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202105-196
db:NVDid:CVE-2021-1447

LAST UPDATE DATE

2024-08-14T12:22:19.735000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-374501date:2021-05-14T00:00:00
db:VULMONid:CVE-2021-1447date:2021-05-14T00:00:00
db:JVNDBid:JVNDB-2021-006609date:2022-01-14T03:03:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202105-196date:2021-05-18T00:00:00
db:NVDid:CVE-2021-1447date:2023-11-07T03:28:20.010

SOURCES RELEASE DATE

db:VULHUBid:VHN-374501date:2021-05-06T00:00:00
db:VULMONid:CVE-2021-1447date:2021-05-06T00:00:00
db:JVNDBid:JVNDB-2021-006609date:2022-01-14T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202105-196date:2021-05-05T00:00:00
db:NVDid:CVE-2021-1447date:2021-05-06T13:15:10.293