CVE-2021-1382

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:28

Type Values Removed Values Added
CWE CWE-77

30 Sep 2022, 02:53

Type Values Removed Values Added
References (MISC) https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 - (MISC) https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 - Exploit, Third Party Advisory
CWE CWE-78
CPE cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*

22 Apr 2022, 16:15

Type Values Removed Values Added
References
  • (MISC) https://github.com/orangecertcc/security-research/security/advisories/GHSA-7xfm-92p7-qc57 -

29 Mar 2021, 22:45

Type Values Removed Values Added
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xesdwcinj-t68PPW7m - Vendor Advisory
CPE cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.2
v3 : 6.7

24 Mar 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-24 20:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-1382

Mitre link : CVE-2021-1382

CVE.ORG link : CVE-2021-1382


JSON object : View

Products Affected

cisco

  • ios_xe
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')