Vulnerability Details : CVE-2021-1528
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges on an affected system. This vulnerability exists because the affected software does not properly restrict access to privileged processes. An attacker could exploit this vulnerability by invoking a privileged process in the affected system. A successful exploit could allow the attacker to perform actions with the privileges of the root user.
Products affected by CVE-2021-1528
- cpe:2.3:a:cisco:vsmart_controller:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:vsmart_controller:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-1528
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-1528
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
Cisco Systems, Inc. | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-1528
-
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.Assigned by: ykramarz@cisco.com (Primary)
References for CVE-2021-1528
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-fuErCWwF
Cisco SD-WAN Software Privilege Escalation VulnerabilityVendor Advisory
Jump to