Vulnerability Details : CVE-2021-34716
A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system as the root user. This vulnerability is due to incorrect handling of certain crafted software images that are uploaded to the affected device. An attacker could exploit this vulnerability by authenticating to the system as an administrative user and then uploading specific crafted software images to the affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user.
Vulnerability category: Execute code
Products affected by CVE-2021-34716
- Cisco » Telepresence Video Communication ServerVersions from including (>=) x8.6 and up to, including, (<=) x14.0.3cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-34716
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 61 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-34716
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
6.7
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
1.2
|
5.5
|
Cisco Systems, Inc. | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST |
CWE ids for CVE-2021-34716
-
The product does not clean up its state or incorrectly cleans up its state when an exception is thrown, leading to unexpected state or control flow.Assigned by: ykramarz@cisco.com (Secondary)
-
The product does not handle or incorrectly handles an exceptional condition.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-34716
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewrce-QPynNCjh
Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution VulnerabilityPatch;Vendor Advisory
Jump to