Vulnerability Details : CVE-2021-1419
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.
Vulnerability category: BypassGain privilege
Products affected by CVE-2021-1419
- Cisco » Wireless Lan Controller SoftwareVersions from including (>=) 8.10 and before (<) 8.10.151.0cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9800_firmware:17.4:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1815m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1830e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1840i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1850e_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:1120_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:1160_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1815w_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1815t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1830i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_1850i_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-1419
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-1419
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Cisco Systems, Inc. | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-1419
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2021-1419
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-ap-LLjsGxv
Cisco Access Points SSH Management Privilege Escalation VulnerabilityPatch;Vendor Advisory
Jump to