CVE-2021-1528
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/06/2021
Last modified:
07/11/2023
Description
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:a:cisco:vsmart_controller:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:a:cisco:vsmart_controller:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:* | 20.4 (including) | 20.4.2 (excluding) |
cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:* | 20.5 (including) | 20.5.1 (excluding) |
cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page