Vulnerability Details : CVE-2021-1498
Public exploit exists!
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Products affected by CVE-2021-1498
- cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
CVE-2021-1498 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Cisco HyperFlex HX Data Platform Command Injection Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Cisco HyperFlex HX Installer Virtual Machine contains an insufficient input validation vulnerability which could allow an attacker to execute commands on an affected device as the tomcat8 user.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2021-1498
Added on
2021-11-03
Action due date
2021-11-17
Exploit prediction scoring system (EPSS) score for CVE-2021-1498
97.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-1498
-
Cisco HyperFlex HX Data Platform Command Execution
Disclosure Date: 2021-05-05First seen: 2021-06-04exploit/linux/http/cisco_hyperflex_hx_data_platform_cmd_execThis module exploits an unauthenticated command injection in Cisco HyperFlex HX Data Platform's /storfs-asup endpoint to execute shell commands as the Tomcat user. Authors: - Nikita Abramov - Mikhail Klyuchnikov - wvu <wvu@metasploit.com>
CVSS scores for CVE-2021-1498
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Cisco Systems, Inc. | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
Cisco Systems, Inc. | 2024-07-25 |
CWE ids for CVE-2021-1498
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2021-1498
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR
Cisco HyperFlex HX Command Injection VulnerabilitiesVendor Advisory
-
http://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html
Cisco HyperFlex HX Data Platform Command Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to