Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-1375 (GCVE-0-2021-1375)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS XE Software |
Version: n/a |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:11:17.044Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1375",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T20:19:30.934031Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T23:32:16.013Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-03-24T20:15:38",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
],
"source": {
"advisory": "cisco-sa-fast-Zqr6DD5",
"defect": [
[
"CSCvr71885",
"CSCvu85472"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS XE Software Fast Reload Vulnerabilities",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-03-24T16:00:00",
"ID": "CVE-2021-1375",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS XE Software Fast Reload Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
]
},
"source": {
"advisory": "cisco-sa-fast-Zqr6DD5",
"defect": [
[
"CSCvr71885",
"CSCvu85472"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1375",
"datePublished": "2021-03-24T20:15:38.162875Z",
"dateReserved": "2020-11-13T00:00:00",
"dateUpdated": "2024-11-08T23:32:16.013Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-1375\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2021-03-24T21:15:12.100\",\"lastModified\":\"2024-11-21T05:44:12.623\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en la funcionalidad fast reload del Software Cisco IOS XE que se ejecuta en los Switches Cisco Catalyst 3850, Cisco Catalyst 9300 y Cisco Catalyst 9300L Series, podr\u00edan permitir a un atacante local autenticado ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente, instalar y arrancar un imagen de software malicioso o ejecutar binarios sin firmar en un dispositivo afectado.\u0026#xa0;Estas vulnerabilidades son debido a comprobaciones incorrectas llevadas a cabo por las rutinas de arranque del sistema.\u0026#xa0;Para explotar estas vulnerabilidades, el atacante necesitar\u00eda acceso privilegiado a la CLI del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente o ejecutar c\u00f3digo sin firmar y omitir la parte de comprobaci\u00f3n de imagen del proceso de arranque seguro.\u0026#xa0;Para mayor informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B2557-821D-4E05-B5C3-67192573D97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE6EC32-51E4-43A3-BFB9-A0D842D08E87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36D2D24-8F63-46DE-AC5F-8DE33332EBC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B825E6-5929-4890-BDBA-4CF4BD2314C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65020120-491D-46CD-8C73-974B6F4C11E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADDCD0A-6168-45A0-A885-76CC70FE2FC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F35C623-6043-43A6-BBAA-478E185480CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D83E34F4-F4DD-49CC-9C95-93F9D4D26B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C8F50DB-3A80-4D89-9F7B-86766D37338B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D4F634-03D5-4D9F-901C-7E9CE45F2F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4463A1D1-E169-4F0B-91B2-FA126BB444CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C9C585C-A6EC-4385-B915-046C110BF95F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE7780-4E8B-4BB6-BDEB-58032EC65851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29CEE37-4044-4A3C-9685-C9C021FD346A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5292764A-7D1C-4E04-86EF-809CB68EDD25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BF9829-F80E-4837-A420-39B291C4E17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820D71D-FC93-45AA-BC58-A26A1A39C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B53E377A-0296-4D7A-B97C-576B0026543D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5019B59-508E-40B0-9C92-2C26F58E2FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E306B09C-CB48-4067-B60C-5F738555EEAC\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5\", \"name\": \"20210324 Cisco IOS XE Software Fast Reload Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T16:11:17.044Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-1375\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T20:19:30.934031Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T20:39:08.681Z\"}}], \"cna\": {\"title\": \"Cisco IOS XE Software Fast Reload Vulnerabilities\", \"source\": {\"defect\": [[\"CSCvr71885\", \"CSCvu85472\"]], \"advisory\": \"cisco-sa-fast-Zqr6DD5\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"datePublic\": \"2021-03-24T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5\", \"name\": \"20210324 Cisco IOS XE Software Fast Reload Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"CWE-347\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2021-03-24T20:15:38\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"6.7\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvr71885\", \"CSCvu85472\"]], \"advisory\": \"cisco-sa-fast-Zqr6DD5\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco IOS XE Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5\", \"name\": \"20210324 Cisco IOS XE Software Fast Reload Vulnerabilities\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-347\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-1375\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS XE Software Fast Reload Vulnerabilities\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2021-03-24T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-1375\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-08T23:32:16.013Z\", \"dateReserved\": \"2020-11-13T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2021-03-24T20:15:38.162875Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
gsd-2021-1375
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-1375",
"description": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GSD-2021-1375"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-1375"
],
"details": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GSD-2021-1375",
"modified": "2023-12-13T01:23:24.027440Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-03-24T16:00:00",
"ID": "CVE-2021-1375",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS XE Software Fast Reload Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "6.7",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
]
},
"source": {
"advisory": "cisco-sa-fast-Zqr6DD5",
"defect": [
[
"CSCvr71885",
"CSCvu85472"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2021-1375"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210324 Cisco IOS XE Software Fast Reload Vulnerabilities",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-03-30T14:17Z",
"publishedDate": "2021-03-24T21:15Z"
}
}
}
cisco-sa-fast-zqr6dd5
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found by Victor Kamensky of Cisco and X.B. of Cisco Advanced Initiatives Group (ASIG) during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r\n\r\nThese vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n\r\n\r\nThis advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408\"].",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches if they are running a vulnerable release of Cisco IOS XE Software.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nIOS Software\r\nIOS XR Software\r\nNX-OS Software",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "These vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.\r\n\r\nDetails about the vulnerabilities are as follows.\r\n\r\nCVE-2021-1375: Cisco IOS XE Software Fast Reload Arbitrary Code Execution Vulnerability\r\n\r\nA vulnerability in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to execute unsigned code at system boot time.\r\n\r\nThis vulnerability is due to incorrect validations of parameters passed to a configuration file that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with a configuration file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvr71885\r\nCVE ID: CVE-2021-1375\r\nSecurity Impact Rating (SIR): High\r\nCVSS Base Score: 6.7\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\r\n\r\nCVE-2021-1376: Cisco IOS XE Software Fast Reload Arbitrary Code Execution Vulnerability\r\n\r\nA vulnerability in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to an improper check on the area of code that manages the verification of boot configuration files during the initial fast reload boot process. To exploit this vulnerability, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system.\r\n\r\nBug ID(s): CSCvu85472\r\nCVE ID: CVE-2021-1376\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.1\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found by Victor Kamensky of Cisco and X.B. of Cisco Advanced Initiatives Group (ASIG) during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS XE Software Fast Reload Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
}
],
"title": "Cisco IOS XE Software Fast Reload Vulnerabilities",
"tracking": {
"current_release_date": "2021-03-31T18:40:34+00:00",
"generator": {
"date": "2024-05-10T23:00:53+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fast-Zqr6DD5",
"initial_release_date": "2021-03-24T16:00:00+00:00",
"revision_history": [
{
"date": "2021-03-24T15:31:15+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-03-31T18:40:34+00:00",
"number": "1.1.0",
"summary": "Added Catalyst 3650 switches as affected products."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "16.5.1",
"product": {
"name": "16.5.1",
"product_id": "CSAFPID-217259"
}
},
{
"category": "service_pack",
"name": "16.5.1a",
"product": {
"name": "16.5.1a",
"product_id": "CSAFPID-225784"
}
}
],
"category": "product_version",
"name": "16.5"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.1",
"product": {
"name": "16.6.1",
"product_id": "CSAFPID-218901"
}
},
{
"category": "service_pack",
"name": "16.6.2",
"product": {
"name": "16.6.2",
"product_id": "CSAFPID-228706"
}
},
{
"category": "service_pack",
"name": "16.6.3",
"product": {
"name": "16.6.3",
"product_id": "CSAFPID-231682"
}
},
{
"category": "service_pack",
"name": "16.6.4",
"product": {
"name": "16.6.4",
"product_id": "CSAFPID-233155"
}
},
{
"category": "service_pack",
"name": "16.6.5",
"product": {
"name": "16.6.5",
"product_id": "CSAFPID-241736"
}
},
{
"category": "service_pack",
"name": "16.6.4s",
"product": {
"name": "16.6.4s",
"product_id": "CSAFPID-244900"
}
},
{
"category": "service_pack",
"name": "16.6.4a",
"product": {
"name": "16.6.4a",
"product_id": "CSAFPID-247629"
}
},
{
"category": "service_pack",
"name": "16.6.6",
"product": {
"name": "16.6.6",
"product_id": "CSAFPID-252914"
}
},
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.8.1",
"product": {
"name": "16.8.1",
"product_id": "CSAFPID-218905"
}
},
{
"category": "service_pack",
"name": "16.8.1a",
"product": {
"name": "16.8.1a",
"product_id": "CSAFPID-235307"
}
},
{
"category": "service_pack",
"name": "16.8.1s",
"product": {
"name": "16.8.1s",
"product_id": "CSAFPID-236834"
}
}
],
"category": "product_version",
"name": "16.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.1",
"product": {
"name": "16.9.1",
"product_id": "CSAFPID-225856"
}
},
{
"category": "service_pack",
"name": "16.9.2",
"product": {
"name": "16.9.2",
"product_id": "CSAFPID-232008"
}
},
{
"category": "service_pack",
"name": "16.9.1s",
"product": {
"name": "16.9.1s",
"product_id": "CSAFPID-244530"
}
},
{
"category": "service_pack",
"name": "16.9.3",
"product": {
"name": "16.9.3",
"product_id": "CSAFPID-251075"
}
},
{
"category": "service_pack",
"name": "16.9.2s",
"product": {
"name": "16.9.2s",
"product_id": "CSAFPID-252272"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.3s",
"product": {
"name": "16.9.3s",
"product_id": "CSAFPID-262549"
}
},
{
"category": "service_pack",
"name": "16.9.3a",
"product": {
"name": "16.9.3a",
"product_id": "CSAFPID-263804"
}
},
{
"category": "service_pack",
"name": "16.9.5",
"product": {
"name": "16.9.5",
"product_id": "CSAFPID-271798"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1",
"product": {
"name": "16.10.1",
"product_id": "CSAFPID-225858"
}
},
{
"category": "service_pack",
"name": "16.10.1s",
"product": {
"name": "16.10.1s",
"product_id": "CSAFPID-252913"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.2",
"product": {
"name": "16.12.2",
"product_id": "CSAFPID-267605"
}
},
{
"category": "service_pack",
"name": "16.12.3",
"product": {
"name": "16.12.3",
"product_id": "CSAFPID-273445"
}
},
{
"category": "service_pack",
"name": "16.12.2s",
"product": {
"name": "16.12.2s",
"product_id": "CSAFPID-273509"
}
},
{
"category": "service_pack",
"name": "16.12.2t",
"product": {
"name": "16.12.2t",
"product_id": "CSAFPID-275538"
}
},
{
"category": "service_pack",
"name": "16.12.4",
"product": {
"name": "16.12.4",
"product_id": "CSAFPID-277147"
}
},
{
"category": "service_pack",
"name": "16.12.3s",
"product": {
"name": "16.12.3s",
"product_id": "CSAFPID-277255"
}
},
{
"category": "service_pack",
"name": "16.12.3a",
"product": {
"name": "16.12.3a",
"product_id": "CSAFPID-277321"
}
},
{
"category": "service_pack",
"name": "16.12.4a",
"product": {
"name": "16.12.4a",
"product_id": "CSAFPID-278881"
}
},
{
"category": "service_pack",
"name": "16.12.1z1",
"product": {
"name": "16.12.1z1",
"product_id": "CSAFPID-281320"
}
},
{
"category": "service_pack",
"name": "16.12.1z2",
"product": {
"name": "16.12.1z2",
"product_id": "CSAFPID-283831"
}
}
],
"category": "product_version",
"name": "16.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.1.1",
"product": {
"name": "17.1.1",
"product_id": "CSAFPID-245377"
}
},
{
"category": "service_pack",
"name": "17.1.1s",
"product": {
"name": "17.1.1s",
"product_id": "CSAFPID-274818"
}
},
{
"category": "service_pack",
"name": "17.1.2",
"product": {
"name": "17.1.2",
"product_id": "CSAFPID-277338"
}
},
{
"category": "service_pack",
"name": "17.1.1t",
"product": {
"name": "17.1.1t",
"product_id": "CSAFPID-277348"
}
}
],
"category": "product_version",
"name": "17.1"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.2.1",
"product": {
"name": "17.2.1",
"product_id": "CSAFPID-251225"
}
},
{
"category": "service_pack",
"name": "17.2.1a",
"product": {
"name": "17.2.1a",
"product_id": "CSAFPID-277343"
}
},
{
"category": "service_pack",
"name": "17.2.2",
"product": {
"name": "17.2.2",
"product_id": "CSAFPID-278504"
}
}
],
"category": "product_version",
"name": "17.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.11.99SW",
"product": {
"name": "17.11.99SW",
"product_id": "CSAFPID-296860"
}
}
],
"category": "product_version",
"name": "17.11SW"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-1376",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvr71885"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvu85472"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
]
},
"release_date": "2021-03-24T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
]
}
],
"title": "Cisco IOS XE Software Secure Boot Verification Bypass Vulnerability"
},
{
"cve": "CVE-2021-1375",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvr71885"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
]
},
"release_date": "2021-03-24T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
]
}
],
"title": "Cisco IOS XE Software Secure Boot Verification Bypass Vulnerability"
}
]
}
cisco-sa-fast-Zqr6DD5
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found by Victor Kamensky of Cisco and X.B. of Cisco Advanced Initiatives Group (ASIG) during internal security testing."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device.\r\n\r\nThese vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process.\r\n\r\nFor more information about these vulnerabilities, see the Details [\"#details\"] section of this advisory.\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\n\r\n\r\nThis advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408\"].",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches if they are running a vulnerable release of Cisco IOS XE Software.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following Cisco products:\r\n\r\nIOS Software\r\nIOS XR Software\r\nNX-OS Software",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "These vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit the other vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerability.\r\n\r\nDetails about the vulnerabilities are as follows.\r\n\r\nCVE-2021-1375: Cisco IOS XE Software Fast Reload Arbitrary Code Execution Vulnerability\r\n\r\nA vulnerability in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to execute unsigned code at system boot time.\r\n\r\nThis vulnerability is due to incorrect validations of parameters passed to a configuration file that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with a configuration file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nBug ID(s): CSCvr71885\r\nCVE ID: CVE-2021-1375\r\nSecurity Impact Rating (SIR): High\r\nCVSS Base Score: 6.7\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\r\n\r\nCVE-2021-1376: Cisco IOS XE Software Fast Reload Arbitrary Code Execution Vulnerability\r\n\r\nA vulnerability in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3650, Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to an improper check on the area of code that manages the verification of boot configuration files during the initial fast reload boot process. To exploit this vulnerability, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system.\r\n\r\nBug ID(s): CSCvu85472\r\nCVE ID: CVE-2021-1376\r\nSecurity Impact Rating (SIR): Medium\r\nCVSS Base Score: 5.1\r\nCVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"title": "Details"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found by Victor Kamensky of Cisco and X.B. of Cisco Advanced Initiatives Group (ASIG) during internal security testing.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@cisco.com",
"issuing_authority": "Cisco PSIRT",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS XE Software Fast Reload Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
}
],
"title": "Cisco IOS XE Software Fast Reload Vulnerabilities",
"tracking": {
"current_release_date": "2021-03-31T18:40:34+00:00",
"generator": {
"date": "2024-05-10T23:00:53+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-fast-Zqr6DD5",
"initial_release_date": "2021-03-24T16:00:00+00:00",
"revision_history": [
{
"date": "2021-03-24T15:31:15+00:00",
"number": "1.0.0",
"summary": "Initial public release."
},
{
"date": "2021-03-31T18:40:34+00:00",
"number": "1.1.0",
"summary": "Added Catalyst 3650 switches as affected products."
}
],
"status": "final",
"version": "1.1.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "16.5.1",
"product": {
"name": "16.5.1",
"product_id": "CSAFPID-217259"
}
},
{
"category": "service_pack",
"name": "16.5.1a",
"product": {
"name": "16.5.1a",
"product_id": "CSAFPID-225784"
}
}
],
"category": "product_version",
"name": "16.5"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.1",
"product": {
"name": "16.6.1",
"product_id": "CSAFPID-218901"
}
},
{
"category": "service_pack",
"name": "16.6.2",
"product": {
"name": "16.6.2",
"product_id": "CSAFPID-228706"
}
},
{
"category": "service_pack",
"name": "16.6.3",
"product": {
"name": "16.6.3",
"product_id": "CSAFPID-231682"
}
},
{
"category": "service_pack",
"name": "16.6.4",
"product": {
"name": "16.6.4",
"product_id": "CSAFPID-233155"
}
},
{
"category": "service_pack",
"name": "16.6.5",
"product": {
"name": "16.6.5",
"product_id": "CSAFPID-241736"
}
},
{
"category": "service_pack",
"name": "16.6.4s",
"product": {
"name": "16.6.4s",
"product_id": "CSAFPID-244900"
}
},
{
"category": "service_pack",
"name": "16.6.4a",
"product": {
"name": "16.6.4a",
"product_id": "CSAFPID-247629"
}
},
{
"category": "service_pack",
"name": "16.6.6",
"product": {
"name": "16.6.6",
"product_id": "CSAFPID-252914"
}
},
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.8.1",
"product": {
"name": "16.8.1",
"product_id": "CSAFPID-218905"
}
},
{
"category": "service_pack",
"name": "16.8.1a",
"product": {
"name": "16.8.1a",
"product_id": "CSAFPID-235307"
}
},
{
"category": "service_pack",
"name": "16.8.1s",
"product": {
"name": "16.8.1s",
"product_id": "CSAFPID-236834"
}
}
],
"category": "product_version",
"name": "16.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.1",
"product": {
"name": "16.9.1",
"product_id": "CSAFPID-225856"
}
},
{
"category": "service_pack",
"name": "16.9.2",
"product": {
"name": "16.9.2",
"product_id": "CSAFPID-232008"
}
},
{
"category": "service_pack",
"name": "16.9.1s",
"product": {
"name": "16.9.1s",
"product_id": "CSAFPID-244530"
}
},
{
"category": "service_pack",
"name": "16.9.3",
"product": {
"name": "16.9.3",
"product_id": "CSAFPID-251075"
}
},
{
"category": "service_pack",
"name": "16.9.2s",
"product": {
"name": "16.9.2s",
"product_id": "CSAFPID-252272"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.3s",
"product": {
"name": "16.9.3s",
"product_id": "CSAFPID-262549"
}
},
{
"category": "service_pack",
"name": "16.9.3a",
"product": {
"name": "16.9.3a",
"product_id": "CSAFPID-263804"
}
},
{
"category": "service_pack",
"name": "16.9.5",
"product": {
"name": "16.9.5",
"product_id": "CSAFPID-271798"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1",
"product": {
"name": "16.10.1",
"product_id": "CSAFPID-225858"
}
},
{
"category": "service_pack",
"name": "16.10.1s",
"product": {
"name": "16.10.1s",
"product_id": "CSAFPID-252913"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.2",
"product": {
"name": "16.12.2",
"product_id": "CSAFPID-267605"
}
},
{
"category": "service_pack",
"name": "16.12.3",
"product": {
"name": "16.12.3",
"product_id": "CSAFPID-273445"
}
},
{
"category": "service_pack",
"name": "16.12.2s",
"product": {
"name": "16.12.2s",
"product_id": "CSAFPID-273509"
}
},
{
"category": "service_pack",
"name": "16.12.2t",
"product": {
"name": "16.12.2t",
"product_id": "CSAFPID-275538"
}
},
{
"category": "service_pack",
"name": "16.12.4",
"product": {
"name": "16.12.4",
"product_id": "CSAFPID-277147"
}
},
{
"category": "service_pack",
"name": "16.12.3s",
"product": {
"name": "16.12.3s",
"product_id": "CSAFPID-277255"
}
},
{
"category": "service_pack",
"name": "16.12.3a",
"product": {
"name": "16.12.3a",
"product_id": "CSAFPID-277321"
}
},
{
"category": "service_pack",
"name": "16.12.4a",
"product": {
"name": "16.12.4a",
"product_id": "CSAFPID-278881"
}
},
{
"category": "service_pack",
"name": "16.12.1z1",
"product": {
"name": "16.12.1z1",
"product_id": "CSAFPID-281320"
}
},
{
"category": "service_pack",
"name": "16.12.1z2",
"product": {
"name": "16.12.1z2",
"product_id": "CSAFPID-283831"
}
}
],
"category": "product_version",
"name": "16.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.1.1",
"product": {
"name": "17.1.1",
"product_id": "CSAFPID-245377"
}
},
{
"category": "service_pack",
"name": "17.1.1s",
"product": {
"name": "17.1.1s",
"product_id": "CSAFPID-274818"
}
},
{
"category": "service_pack",
"name": "17.1.2",
"product": {
"name": "17.1.2",
"product_id": "CSAFPID-277338"
}
},
{
"category": "service_pack",
"name": "17.1.1t",
"product": {
"name": "17.1.1t",
"product_id": "CSAFPID-277348"
}
}
],
"category": "product_version",
"name": "17.1"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.2.1",
"product": {
"name": "17.2.1",
"product_id": "CSAFPID-251225"
}
},
{
"category": "service_pack",
"name": "17.2.1a",
"product": {
"name": "17.2.1a",
"product_id": "CSAFPID-277343"
}
},
{
"category": "service_pack",
"name": "17.2.2",
"product": {
"name": "17.2.2",
"product_id": "CSAFPID-278504"
}
}
],
"category": "product_version",
"name": "17.2"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.11.99SW",
"product": {
"name": "17.11.99SW",
"product_id": "CSAFPID-296860"
}
}
],
"category": "product_version",
"name": "17.11SW"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-1376",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvr71885"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvu85472"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
]
},
"release_date": "2021-03-24T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-251225",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-271798",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-274818",
"CSAFPID-275538",
"CSAFPID-277147",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277343",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-278504",
"CSAFPID-278881",
"CSAFPID-281320",
"CSAFPID-283831",
"CSAFPID-296860"
]
}
],
"title": "Cisco IOS XE Software Secure Boot Verification Bypass Vulnerability"
},
{
"cve": "CVE-2021-1375",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvr71885"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
]
},
"release_date": "2021-03-24T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-217259",
"CSAFPID-218901",
"CSAFPID-218905",
"CSAFPID-225784",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228706",
"CSAFPID-231682",
"CSAFPID-232008",
"CSAFPID-233155",
"CSAFPID-235307",
"CSAFPID-236834",
"CSAFPID-241736",
"CSAFPID-244530",
"CSAFPID-244900",
"CSAFPID-245377",
"CSAFPID-247629",
"CSAFPID-251075",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-252914",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-267110",
"CSAFPID-267605",
"CSAFPID-273509",
"CSAFPID-275538",
"CSAFPID-296860"
]
}
],
"title": "Cisco IOS XE Software Secure Boot Verification Bypass Vulnerability"
}
]
}
ghsa-4c73-wx52-99cm
Vulnerability from github
Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.
{
"affected": [],
"aliases": [
"CVE-2021-1375"
],
"database_specific": {
"cwe_ids": [
"CWE-347"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-03-24T21:15:00Z",
"severity": "HIGH"
},
"details": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.",
"id": "GHSA-4c73-wx52-99cm",
"modified": "2022-05-24T17:45:12Z",
"published": "2022-05-24T17:45:12Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1375"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
],
"schema_version": "1.4.0",
"severity": []
}
cnvd-2021-50585
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5
| Name | Cisco IOS XE |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-1375",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-1375"
}
},
"description": "Cisco IOS XE\u662f\u7f8e\u56fdCisco\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u4e00\u5957\u57fa\u4e8eLinux\u5185\u6838\u7684\u6a21\u5757\u5316\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS XE\u5b58\u5728\u5feb\u901f\u91cd\u8f7d\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5e95\u5c42\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5b89\u88c5\u5e76\u5f15\u5bfc\u6076\u610f\u8f6f\u4ef6\u955c\u50cf\uff0c\u6216\u5728\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u4e0a\u6267\u884c\u672a\u7b7e\u540d\u7684\u4e8c\u8fdb\u5236\u6587\u4ef6\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-50585",
"openTime": "2021-07-14",
"patchDescription": "Cisco IOS XE\u662f\u7f8e\u56fdCisco\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u4e00\u5957\u57fa\u4e8eLinux\u5185\u6838\u7684\u6a21\u5757\u5316\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS XE\u5b58\u5728\u5feb\u901f\u91cd\u8f7d\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u5e95\u5c42\u64cd\u4f5c\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff0c\u5b89\u88c5\u5e76\u5f15\u5bfc\u6076\u610f\u8f6f\u4ef6\u955c\u50cf\uff0c\u6216\u5728\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u4e0a\u6267\u884c\u672a\u7b7e\u540d\u7684\u4e8c\u8fdb\u5236\u6587\u4ef6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS XE\u5feb\u901f\u91cd\u8f7d\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Cisco IOS XE"
},
"referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5",
"serverity": "\u9ad8",
"submitTime": "2021-03-25",
"title": "Cisco IOS XE\u5feb\u901f\u91cd\u8f7d\u6f0f\u6d1e"
}
CERTFR-2021-AVI-219
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco Catalyst IE3400 Heavy Duty Series Switches | ||
| Cisco | N/A | Cisco Catalyst IE3400 Rugged Series Switches | ||
| Cisco | IOS XE | Cisco IOS XE SD-WAN Software | ||
| Cisco | N/A | Cisco Catalyst 9100 APs | ||
| Cisco | N/A | Cisco Aironet 2800 Series APs | ||
| Cisco | N/A | Cisco Aironet 1540 Series APs | ||
| Cisco | IOS XE | Cisco IOS XE Software | ||
| Cisco | N/A | Cisco Catalyst 9300L | ||
| Cisco | N/A | Cisco Aironet 1800 Series APs | ||
| Cisco | N/A | Cisco Aironet 4800 APs | ||
| Cisco | Jabber | Cisco Jabber for MacOS | ||
| Cisco | N/A | Cisco Catalyst 3850 | ||
| Cisco | N/A | Cisco Catalyst C9500-48Y4C Switch | ||
| Cisco | N/A | Cisco Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches | ||
| Cisco | Jabber | Cisco Jabber for mobile platforms | ||
| Cisco | N/A | Cisco Catalyst IW 6300 APs | ||
| Cisco | N/A | Cisco Catalyst 9800 Series Wireless Controllers | ||
| Cisco | N/A | Cisco Catalyst 9400 Series Switches | ||
| Cisco | N/A | Cisco Catalyst 9600 Series Switches | ||
| Cisco | N/A | Cisco Catalyst 9300 | ||
| Cisco | Jabber | Cisco Jabber for Windows | ||
| Cisco | N/A | Cisco Catalyst C9500-24Y4C Switch | ||
| Cisco | N/A | Cisco Catalyst IE3300 Rugged Series Switches | ||
| Cisco | N/A | Cisco Aironet 3800 Series APs | ||
| Cisco | N/A | Cisco Catalyst C9500-32QC Switch | ||
| Cisco | N/A | Cisco Catalyst IE3200 Rugged Series Switches | ||
| Cisco | N/A | Cisco Catalyst C9500-32C Switch | ||
| Cisco | N/A | Cisco Aironet 1560 Series APs |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco Catalyst IE3400 Heavy Duty Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst IE3400 Rugged Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE SD-WAN Software",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9100 APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 2800 Series APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 1540 Series APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE Software",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9300L",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 1800 Series APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 4800 APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Jabber for MacOS",
"product": {
"name": "Jabber",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 3850",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst C9500-48Y4C Switch",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Jabber for mobile platforms",
"product": {
"name": "Jabber",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst IW 6300 APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9800 Series Wireless Controllers",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9400 Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9600 Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 9300",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Jabber for Windows",
"product": {
"name": "Jabber",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst C9500-24Y4C Switch",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst IE3300 Rugged Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 3800 Series APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst C9500-32QC Switch",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst IE3200 Rugged Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst C9500-32C Switch",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Aironet 1560 Series APs",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-1441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1441"
},
{
"name": "CVE-2021-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1411"
},
{
"name": "CVE-2021-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1376"
},
{
"name": "CVE-2021-1373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1373"
},
{
"name": "CVE-2021-1453",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1453"
},
{
"name": "CVE-2021-1375",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1375"
},
{
"name": "CVE-2021-1446",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1446"
},
{
"name": "CVE-2021-1437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1437"
},
{
"name": "CVE-2021-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1417"
},
{
"name": "CVE-2021-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1392"
},
{
"name": "CVE-2021-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1398"
},
{
"name": "CVE-2021-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1471"
},
{
"name": "CVE-2021-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1452"
},
{
"name": "CVE-2021-1449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1449"
},
{
"name": "CVE-2021-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1439"
},
{
"name": "CVE-2021-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1418"
},
{
"name": "CVE-2021-1469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1469"
},
{
"name": "CVE-2021-1403",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1403"
},
{
"name": "CVE-2021-1451",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1451"
},
{
"name": "CVE-2021-1432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1432"
},
{
"name": "CVE-2021-1433",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1433"
},
{
"name": "CVE-2021-1442",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1442"
},
{
"name": "CVE-2021-1431",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1431"
},
{
"name": "CVE-2021-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1352"
}
],
"initial_release_date": "2021-03-25T00:00:00",
"last_revision_date": "2021-03-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cisco-jabber-PWrTATTC du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-jabber-PWrTATTC"
}
],
"reference": "CERTFR-2021-AVI-219",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-aironet-mdns-dos-E6KwYuMx du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-romvar-cmd-inj-N56fYbrw du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-romvar-cmd-inj-N56fYbrw"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-buffover-CqdRWLc du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-buffover-CqdRWLc"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fast-Zqr6DD5 du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-xe-cat-verify-BQ5hrXgH du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cat-verify-BQ5hrXgH"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-xe-iot-codexec-k46EFF6q du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-iot-codexec-k46EFF6q"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-sdwdos-4zeEeC9w du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwdos-4zeEeC9w"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-aironet-info-disc-BfWqghj du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-info-disc-BfWqghj"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-cswsh-FKk9AzT5 du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cswsh-FKk9AzT5"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-alg-dos-hbBS7SZE du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-hbBS7SZE"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-decnet-dos-cuPWDkyL du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-decnet-dos-cuPWDkyL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-xe-evss-code-exe-8cw5VSvw du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3 du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-XE-ACE-75K3bRWe du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-ACE-75K3bRWe"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ewlc-capwap-dos-2OA3JgKS du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-dos-2OA3JgKS"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-XE-SAP-OPLbze68 du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ap-privesc-wEVfp8Ud du 24 mars 2021",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-privesc-wEVfp8Ud"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cisco-jabber-PWrTATTChttps: du 24 mars 2021",
"url": null
}
]
}
var-202103-0548
Vulnerability from variot
Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco Catalyst Runs on series switches Cisco IOS XE Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco IOS XE SD-WAN Software is a software for network management (software-defined networking) applied to the Cisco IOS XE network operating system from Cisco
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202103-0548",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "17.1.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.5.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2t"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.8.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.2s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.3s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1s"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.4s"
},
{
"model": "cisco ios xe",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
"version": null
},
{
"model": "cisco ios xe",
"scope": null,
"trust": 0.8,
"vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"cve": "CVE-2021-1375",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2021-1375",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-374429",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2021-1375",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2021-1375",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-1375",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2021-1375",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2021-1375",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202103-1449",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-374429",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2021-1375",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory. plural Cisco Catalyst Runs on series switches Cisco IOS XE Exists in a digital signature validation vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Cisco IOS XE SD-WAN Software is a software for network management (software-defined networking) applied to the Cisco IOS XE network operating system from Cisco",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "VULMON",
"id": "CVE-2021-1375"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-1375",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-374429",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2021-1375",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"id": "VAR-202103-0548",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-374429"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T22:57:58.837000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-fast-Zqr6DD5",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
},
{
"title": "Cisco IOS XE SD-WAN Software Repair measures for data forgery problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=145731"
},
{
"title": "Cisco: Cisco IOS XE Software Fast Reload Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-fast-Zqr6DD5"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-347",
"trust": 1.1
},
{
"problemtype": "Improper verification of digital signatures (CWE-347) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-fast-zqr6dd5"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-1375"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/cisco-ios-ios-xe-multiple-vulnerabilities-34940"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/347.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/198729"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-374429"
},
{
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-03-24T00:00:00",
"db": "VULHUB",
"id": "VHN-374429"
},
{
"date": "2021-03-24T00:00:00",
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"date": "2021-12-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"date": "2021-03-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"date": "2021-03-24T21:15:12.100000",
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-03-30T00:00:00",
"db": "VULHUB",
"id": "VHN-374429"
},
{
"date": "2021-03-30T00:00:00",
"db": "VULMON",
"id": "CVE-2021-1375"
},
{
"date": "2021-12-01T09:06:00",
"db": "JVNDB",
"id": "JVNDB-2021-004895"
},
{
"date": "2021-03-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202103-1449"
},
{
"date": "2024-11-21T05:44:12.623000",
"db": "NVD",
"id": "CVE-2021-1375"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Cisco\u00a0Catalyst\u00a0 Runs on series switches \u00a0Cisco\u00a0IOS\u00a0XE\u00a0 Digital Signature Verification Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-004895"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "data forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202103-1449"
}
],
"trust": 0.6
}
}
fkie_cve-2021-1375
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe | 16.5.1 | |
| cisco | ios_xe | 16.5.1a | |
| cisco | ios_xe | 16.6.1 | |
| cisco | ios_xe | 16.6.2 | |
| cisco | ios_xe | 16.6.3 | |
| cisco | ios_xe | 16.6.4 | |
| cisco | ios_xe | 16.6.4a | |
| cisco | ios_xe | 16.6.4s | |
| cisco | ios_xe | 16.6.5 | |
| cisco | ios_xe | 16.6.6 | |
| cisco | ios_xe | 16.6.7 | |
| cisco | ios_xe | 16.8.1 | |
| cisco | ios_xe | 16.8.1a | |
| cisco | ios_xe | 16.8.1s | |
| cisco | ios_xe | 16.9.1 | |
| cisco | ios_xe | 16.9.1s | |
| cisco | ios_xe | 16.9.2 | |
| cisco | ios_xe | 16.9.2s | |
| cisco | ios_xe | 16.9.3 | |
| cisco | ios_xe | 16.9.3a | |
| cisco | ios_xe | 16.9.3s | |
| cisco | ios_xe | 16.9.4 | |
| cisco | ios_xe | 16.10.1 | |
| cisco | ios_xe | 16.10.1e | |
| cisco | ios_xe | 16.10.1s | |
| cisco | ios_xe | 16.11.1 | |
| cisco | ios_xe | 16.11.1b | |
| cisco | ios_xe | 16.11.1c | |
| cisco | ios_xe | 16.11.1s | |
| cisco | ios_xe | 16.11.2 | |
| cisco | ios_xe | 16.12.1 | |
| cisco | ios_xe | 16.12.1c | |
| cisco | ios_xe | 16.12.1s | |
| cisco | ios_xe | 16.12.2 | |
| cisco | ios_xe | 16.12.2s | |
| cisco | ios_xe | 16.12.2t | |
| cisco | ios_xe | 17.1.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
"matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
"matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en la funcionalidad fast reload del Software Cisco IOS XE que se ejecuta en los Switches Cisco Catalyst 3850, Cisco Catalyst 9300 y Cisco Catalyst 9300L Series, podr\u00edan permitir a un atacante local autenticado ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente, instalar y arrancar un imagen de software malicioso o ejecutar binarios sin firmar en un dispositivo afectado.\u0026#xa0;Estas vulnerabilidades son debido a comprobaciones incorrectas llevadas a cabo por las rutinas de arranque del sistema.\u0026#xa0;Para explotar estas vulnerabilidades, el atacante necesitar\u00eda acceso privilegiado a la CLI del dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el sistema operativo subyacente o ejecutar c\u00f3digo sin firmar y omitir la parte de comprobaci\u00f3n de imagen del proceso de arranque seguro.\u0026#xa0;Para mayor informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
}
],
"id": "CVE-2021-1375",
"lastModified": "2024-11-21T05:44:12.623",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-03-24T21:15:12.100",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fast-Zqr6DD5"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.