Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-1476 (GCVE-0-2021-1476)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Adaptive Security Appliance (ASA) Software |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:11:17.683Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-1476", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T20:18:36.240053Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-08T23:23:34.923Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco Adaptive Security Appliance (ASA) Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-29T17:30:55", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ], "source": { "advisory": "cisco-sa-asa-ftd-cmd-inj-SELprvG", "defect": [ [ "CSCvx05381" ] ], "discovery": "INTERNAL" }, "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-04-28T16:00:00", "ID": "CVE-2021-1476", "STATE": "PUBLIC", "TITLE": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Adaptive Security Appliance (ASA) Software", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "6.7", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ] }, "source": { "advisory": "cisco-sa-asa-ftd-cmd-inj-SELprvG", "defect": [ [ "CSCvx05381" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-1476", "datePublished": "2021-04-29T17:30:55.729681Z", "dateReserved": "2020-11-13T00:00:00", "dateUpdated": "2024-11-08T23:23:34.923Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-1476\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2021-04-29T18:15:09.197\",\"lastModified\":\"2024-11-21T05:44:26.607\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la CLI del Software Cisco Adaptive Security Appliance (ASA) y el software Cisco Firepower Threat Defense (FTD), podr\u00eda permitir a un atacante autenticado local ejecutar comandos arbitrarios en el sistema operativo (SO) subyacente de un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de entrada de los comandos suministrados por el usuario.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en un dispositivo y enviar una entrada dise\u00f1ada para comandos espec\u00edficos.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos en el sistema operativo subyacente con privilegios root.\u0026#xa0;Para explotar esta vulnerabilidad, un atacante debe tener credenciales v\u00e1lidas de nivel de administrador\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.0\",\"versionEndExcluding\":\"6.6.4\",\"matchCriteriaId\":\"04202164-FCC4-413E-90B5-01FE08AC6EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7.0\",\"versionEndExcluding\":\"6.7.0.2\",\"matchCriteriaId\":\"FDDF492B-BC61-4814-B05F-3F6CD07080F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.13\",\"versionEndExcluding\":\"9.13.1.21\",\"matchCriteriaId\":\"5B74C14F-C95B-4AF5-A255-1CA824AA7FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.14\",\"versionEndExcluding\":\"9.14.2.13\",\"matchCriteriaId\":\"06071877-6E69-4440-9306-6410223218D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.15\",\"versionEndExcluding\":\"9.15.1.10\",\"matchCriteriaId\":\"97985BC1-7D4F-465A-863B-9EAD980A4CF1\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG\", \"name\": \"20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T16:11:17.683Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-1476\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T20:18:36.240053Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T20:37:48.983Z\"}}], \"cna\": {\"title\": \"Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability\", \"source\": {\"defect\": [[\"CSCvx05381\"]], \"advisory\": \"cisco-sa-asa-ftd-cmd-inj-SELprvG\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Adaptive Security Appliance (ASA) Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2021-04-28T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG\", \"name\": \"20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2021-04-29T17:30:55\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"6.7\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\"}}, \"source\": {\"defect\": [[\"CSCvx05381\"]], \"advisory\": \"cisco-sa-asa-ftd-cmd-inj-SELprvG\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco Adaptive Security Appliance (ASA) Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG\", \"name\": \"20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-78\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-1476\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2021-04-28T16:00:00\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2021-1476\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-08T23:23:34.923Z\", \"dateReserved\": \"2020-11-13T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2021-04-29T17:30:55.729681Z\", \"assignerShortName\": \"cisco\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2021-1476
Vulnerability from fkie_nvd
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "04202164-FCC4-413E-90B5-01FE08AC6EEC", "versionEndExcluding": "6.6.4", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDDF492B-BC61-4814-B05F-3F6CD07080F7", "versionEndExcluding": "6.7.0.2", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B74C14F-C95B-4AF5-A255-1CA824AA7FDE", "versionEndExcluding": "9.13.1.21", "versionStartIncluding": "9.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "06071877-6E69-4440-9306-6410223218D7", "versionEndExcluding": "9.14.2.13", "versionStartIncluding": "9.14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "97985BC1-7D4F-465A-863B-9EAD980A4CF1", "versionEndExcluding": "9.15.1.10", "versionStartIncluding": "9.15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials." }, { "lang": "es", "value": "Una vulnerabilidad en la CLI del Software Cisco Adaptive Security Appliance (ASA) y el software Cisco Firepower Threat Defense (FTD), podr\u00eda permitir a un atacante autenticado local ejecutar comandos arbitrarios en el sistema operativo (SO) subyacente de un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de entrada de los comandos suministrados por el usuario.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad al autenticarse en un dispositivo y enviar una entrada dise\u00f1ada para comandos espec\u00edficos.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos en el sistema operativo subyacente con privilegios root.\u0026#xa0;Para explotar esta vulnerabilidad, un atacante debe tener credenciales v\u00e1lidas de nivel de administrador" } ], "id": "CVE-2021-1476", "lastModified": "2024-11-21T05:44:26.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-29T18:15:09.197", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }
gsd-2021-1476
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-1476", "description": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.", "id": "GSD-2021-1476" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-1476" ], "details": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.", "id": "GSD-2021-1476", "modified": "2023-12-13T01:23:22.428783Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-04-28T16:00:00", "ID": "CVE-2021-1476", "STATE": "PUBLIC", "TITLE": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Adaptive Security Appliance (ASA) Software ", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials." } ] }, "exploit": [ { "lang": "eng", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "impact": { "cvss": { "baseScore": "6.7", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H ", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ] }, "source": { "advisory": "cisco-sa-asa-ftd-cmd-inj-SELprvG", "defect": [ [ "CSCvx05381" ] ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.6.4", "versionStartIncluding": "6.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.7.0.2", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.13.1.21", "versionStartIncluding": "9.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.14.2.13", "versionStartIncluding": "9.14", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "9.15.1.10", "versionStartIncluding": "9.15", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2021-1476" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "20210428 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "refsource": "CISCO", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-08-16T16:18Z", "publishedDate": "2021-04-29T18:15Z" } } }
var-202104-0897
Vulnerability from variot
A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Firepower Threat Defense is a suite of unified software that provides next-generation firewall services. Cisco Adaptive Security Appliance is a network device. Used to protect corporate networks and data centers of all sizes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-0897", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.14" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.13" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.15.1.10" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.14.2.13" }, { "model": "firepower threat defense", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.7.0.2" }, { "model": "firepower threat defense", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "6.6.4" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 1.0, "vendor": "cisco", "version": "9.13.1.21" }, { "model": "firepower threat defense", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "6.5.0" }, { "model": "adaptive security appliance software", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "9.15" }, { "model": "firepower threat defense", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "6.7.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-1476" } ] }, "cve": "CVE-2021-1476", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2021-1476", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-374530", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2021-1476", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-1476", "trust": 1.0, "value": "MEDIUM" }, { "author": "ykramarz@cisco.com", "id": "CVE-2021-1476", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-2078", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-374530", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-1476", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-374530" }, { "db": "VULMON", "id": "CVE-2021-1476" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "db": "NVD", "id": "CVE-2021-1476" }, { "db": "NVD", "id": "CVE-2021-1476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Cisco Firepower Threat Defense is a suite of unified software that provides next-generation firewall services. Cisco Adaptive Security Appliance is a network device. Used to protect corporate networks and data centers of all sizes", "sources": [ { "db": "NVD", "id": "CVE-2021-1476" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "VULHUB", "id": "VHN-374530" }, { "db": "VULMON", "id": "CVE-2021-1476" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-1476", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202104-2078", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021041363", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202104-975", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1468", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021042833", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-374530", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-1476", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374530" }, { "db": "VULMON", "id": "CVE-2021-1476" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "db": "NVD", "id": "CVE-2021-1476" } ] }, "id": "VAR-202104-0897", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-374530" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T13:16:37.174000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco\u00a0Adaptive Security Appliance and Cisco\u00a0Firepower Threat Defense Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=149018" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-2078" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-374530" }, { "db": "NVD", "id": "CVE-2021-1476" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-asa-ftd-cmd-inj-selprvg" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021041363" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021042833" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-1476" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1468" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-asa-shell-command-execution-via-cli-35205" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-374530" }, { "db": "VULMON", "id": "CVE-2021-1476" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "db": "NVD", "id": "CVE-2021-1476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-374530" }, { "db": "VULMON", "id": "CVE-2021-1476" }, { "db": "CNNVD", "id": "CNNVD-202104-975" }, { "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "db": "NVD", "id": "CVE-2021-1476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-29T00:00:00", "db": "VULHUB", "id": "VHN-374530" }, { "date": "2021-04-29T00:00:00", "db": "VULMON", "id": "CVE-2021-1476" }, { "date": "2021-04-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "date": "2021-04-29T18:15:09.197000", "db": "NVD", "id": "CVE-2021-1476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-05-09T00:00:00", "db": "VULHUB", "id": "VHN-374530" }, { "date": "2021-05-09T00:00:00", "db": "VULMON", "id": "CVE-2021-1476" }, { "date": "2021-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-975" }, { "date": "2021-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-2078" }, { "date": "2023-11-07T03:28:23.913000", "db": "NVD", "id": "CVE-2021-1476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-2078" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pillow Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-975" } ], "trust": 0.6 } }
cisco-sa-asa-ftd-cmd-inj-selprvg
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found by Ilkin Gasimov of Cisco during internal security testing." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device.\r\n\r\nThe vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "At the time of publication, this vulnerability affected the following Cisco products:\r\n\r\nASA Software releases 9.13 through the first fixed release\r\nFTD Software releases 6.5 through the first fixed release\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Cisco FTD Software has two modes of deployment: native mode and multi-instance (MI) mode.\r\n\r\nIn native mode, administrators always have access to the underlying root shell (called Expert Mode). Therefore, this vulnerability does not affect Cisco FTD Software deployments that are in native mode.\r\n\r\nIn MI mode, Expert Mode must be manually configured. Therefore, a malicious administrator who has not been granted access to the underlying root shell could exploit this vulnerability to bypass that restriction.\r\n\r\nFor Cisco ASA Software, there is no legitimate way to access the underlying root shell. Therefore, all Cisco ASA Software deployments are affected by this vulnerability.", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability.\r\n\r\nASA Software\r\n Cisco ASA Software Release First Fixed Release for This Vulnerability Earlier than 9.131 Not vulnerable. 9.13 9.13.1.21 9.14 9.14.2.13 9.15 9.15.1.10\r\n1. Cisco ASA Software releases 9.7 and earlier, as well as Release 9.10, have reached end of software maintenance [\"https://www.cisco.com/c/en/us/products/eos-eol-listing.html\"]. Customers are advised to migrate to a supported release that includes the fix for this vulnerability.\r\n\r\nFTD Software\r\n Cisco FTD Software Release First Fixed Release for This Vulnerability Earlier than 6.51 Not vulnerable. 6.5.0 Migrate to a fixed release. 6.6.0 6.6.42 6.7.0 6.7.0.2\r\n1. Cisco FMC and FTD Software releases 6.0.1 and earlier, as well as releases 6.2.0 and 6.2.1, have reached end of software maintenance [\"https://www.cisco.com/c/en/us/products/eos-eol-listing.html\"]. Customers are advised to migrate to a supported release that includes the fix for this vulnerability.\r\n\r\n2. The First Fixed Release for the 6.6.0 code train was 6.6.3; however, due to upgrade issues associated with CSCvx86231 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx86231\"] the recommended release is 6.6.4.\r\n\r\nTo upgrade to a fixed release of Cisco FTD Software, do one of the following:\r\n\r\nFor devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy.\r\nFor devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found by Ilkin Gasimov of Cisco during internal security testing.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "end of software maintenance", "url": "https://www.cisco.com/c/en/us/products/eos-eol-listing.html" }, { "category": "external", "summary": "CSCvx86231", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx86231" } ], "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "tracking": { "current_release_date": "2021-04-28T16:00:00+00:00", "generator": { "date": "2024-05-10T23:03:02+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-asa-ftd-cmd-inj-SELprvG", "initial_release_date": "2021-04-28T16:00:00+00:00", "revision_history": [ { "date": "2021-04-19T13:22:34+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "9.14.1", "product": { "name": "9.14.1", "product_id": "CSAFPID-278380" } }, { "category": "service_pack", "name": "9.14.1.10", "product": { "name": "9.14.1.10", "product_id": "CSAFPID-278725" } }, { "category": "service_pack", "name": "9.14.1.6", "product": { "name": "9.14.1.6", "product_id": "CSAFPID-278754" } }, { "category": "service_pack", "name": "9.14.1.15", "product": { "name": "9.14.1.15", "product_id": "CSAFPID-278807" } }, { "category": "service_pack", "name": "9.14.1.19", "product": { "name": "9.14.1.19", "product_id": "CSAFPID-279344" } }, { "category": "service_pack", "name": "9.14.1.30", "product": { "name": "9.14.1.30", "product_id": "CSAFPID-280409" } }, { "category": "service_pack", "name": "9.14.2", "product": { "name": "9.14.2", "product_id": "CSAFPID-281571" } }, { "category": "service_pack", "name": "9.14.2.4", "product": { "name": "9.14.2.4", "product_id": "CSAFPID-281572" } }, { "category": "service_pack", "name": "9.14.2.8", "product": { "name": "9.14.2.8", "product_id": "CSAFPID-281573" } } ], "category": "product_version", "name": "9.14" } ], "category": "product_family", "name": "Cisco Adaptive Security Appliance (ASA) Software" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "6.6.0", "product": { "name": "6.6.0", "product_id": "CSAFPID-225862" } }, { "category": "service_pack", "name": "6.6.0.1", "product": { "name": "6.6.0.1", "product_id": "CSAFPID-278885" } }, { "category": "service_pack", "name": "6.6.1", "product": { "name": "6.6.1", "product_id": "CSAFPID-280013" } } ], "category": "product_version", "name": "6.6" } ], "category": "product_family", "name": "Cisco Firepower Threat Defense Software" }, { "category": "product_name", "name": "Cisco Firepower 2100 Series", "product": { "name": "Cisco Firepower 2100 Series", "product_id": "CSAFPID-277392" } }, { "category": "product_name", "name": "Cisco Firepower 1000 Series", "product": { "name": "Cisco Firepower 1000 Series", "product_id": "CSAFPID-277393" } }, { "category": "product_name", "name": "Cisco ASA 5500-X Series Firewalls", "product": { "name": "Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-277437" } }, { "category": "product_name", "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product": { "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-277438" } }, { "category": "product_name", "name": "Cisco Firepower 9000 Series", "product": { "name": "Cisco Firepower 9000 Series", "product_id": "CSAFPID-277440" } }, { "category": "product_name", "name": "Cisco Firepower 4100 Series", "product": { "name": "Cisco Firepower 4100 Series", "product_id": "CSAFPID-277441" } }, { "category": "product_name", "name": "Cisco Adaptive Security Virtual Appliance (ASAv)", "product": { "name": "Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-277511" } }, { "category": "product_name", "name": "Cisco Secure Firewall Threat Defense Virtual", "product": { "name": "Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-277464" } } ], "category": "vendor", "name": "Cisco" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278380:277392" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278380:277393" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278380:277437" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278380:277438" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278380:277440" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278380:277441" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278380:277511" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278725:277392" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278725:277393" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278725:277437" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278725:277438" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278725:277440" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278725:277441" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278725:277511" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.6 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278754:277511" }, "product_reference": "CSAFPID-278754", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278807:277392" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278807:277393" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278807:277437" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278807:277438" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278807:277440" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278807:277441" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278807:277511" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-279344:277392" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-279344:277393" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-279344:277437" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-279344:277438" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-279344:277440" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-279344:277441" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-279344:277511" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-280409:277392" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-280409:277393" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-280409:277437" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-280409:277438" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-280409:277440" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-280409:277441" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-280409:277511" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281571:277392" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281571:277393" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281571:277437" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281571:277438" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281571:277440" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281571:277441" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281571:277511" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281572:277392" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281572:277393" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281572:277437" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281572:277438" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281572:277440" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281572:277441" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281572:277511" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281573:277392" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281573:277393" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281573:277437" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281573:277438" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281573:277440" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281573:277441" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281573:277511" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-225862:277392" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-225862:277393" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-225862:277437" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-225862:277438" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-225862:277440" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-225862:277441" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-225862:277464" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278885:277392" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278885:277393" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278885:277437" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278885:277438" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278885:277440" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278885:277441" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-278885:277464" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-280013:277392" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-280013:277393" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-280013:277437" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-280013:277438" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-280013:277440" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-280013:277441" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-280013:277464" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277464" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-1476", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx05381" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511", "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464" ] }, "release_date": "2021-04-28T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464", "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511", "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464" ] } ], "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability" } ] }
cisco-sa-asa-ftd-cmd-inj-SELprvG
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found by Ilkin Gasimov of Cisco during internal security testing." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device.\r\n\r\nThe vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "At the time of publication, this vulnerability affected the following Cisco products:\r\n\r\nASA Software releases 9.13 through the first fixed release\r\nFTD Software releases 6.5 through the first fixed release\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco Firepower Management Center (FMC) Software.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Cisco FTD Software has two modes of deployment: native mode and multi-instance (MI) mode.\r\n\r\nIn native mode, administrators always have access to the underlying root shell (called Expert Mode). Therefore, this vulnerability does not affect Cisco FTD Software deployments that are in native mode.\r\n\r\nIn MI mode, Expert Mode must be manually configured. Therefore, a malicious administrator who has not been granted access to the underlying root shell could exploit this vulnerability to bypass that restriction.\r\n\r\nFor Cisco ASA Software, there is no legitimate way to access the underlying root shell. Therefore, all Cisco ASA Software deployments are affected by this vulnerability.", "title": "Details" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "When considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Fixed Releases\r\nAt the time of publication, the release information in the following table(s) was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.\r\n\r\nThe left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerability described in this advisory and which release included the fix for this vulnerability.\r\n\r\nASA Software\r\n Cisco ASA Software Release First Fixed Release for This Vulnerability Earlier than 9.131 Not vulnerable. 9.13 9.13.1.21 9.14 9.14.2.13 9.15 9.15.1.10\r\n1. Cisco ASA Software releases 9.7 and earlier, as well as Release 9.10, have reached end of software maintenance [\"https://www.cisco.com/c/en/us/products/eos-eol-listing.html\"]. Customers are advised to migrate to a supported release that includes the fix for this vulnerability.\r\n\r\nFTD Software\r\n Cisco FTD Software Release First Fixed Release for This Vulnerability Earlier than 6.51 Not vulnerable. 6.5.0 Migrate to a fixed release. 6.6.0 6.6.42 6.7.0 6.7.0.2\r\n1. Cisco FMC and FTD Software releases 6.0.1 and earlier, as well as releases 6.2.0 and 6.2.1, have reached end of software maintenance [\"https://www.cisco.com/c/en/us/products/eos-eol-listing.html\"]. Customers are advised to migrate to a supported release that includes the fix for this vulnerability.\r\n\r\n2. The First Fixed Release for the 6.6.0 code train was 6.6.3; however, due to upgrade issues associated with CSCvx86231 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx86231\"] the recommended release is 6.6.4.\r\n\r\nTo upgrade to a fixed release of Cisco FTD Software, do one of the following:\r\n\r\nFor devices that are managed by using Cisco Firepower Management Center (FMC), use the FMC interface to install the upgrade. After installation is complete, reapply the access control policy.\r\nFor devices that are managed by using Cisco Firepower Device Manager (FDM), use the FDM interface to install the upgrade. After installation is complete, reapply the access control policy.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found by Ilkin Gasimov of Cisco during internal security testing.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco\u0026nbsp;Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "end of software maintenance", "url": "https://www.cisco.com/c/en/us/products/eos-eol-listing.html" }, { "category": "external", "summary": "CSCvx86231", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx86231" } ], "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability", "tracking": { "current_release_date": "2021-04-28T16:00:00+00:00", "generator": { "date": "2024-05-10T23:03:02+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-asa-ftd-cmd-inj-SELprvG", "initial_release_date": "2021-04-28T16:00:00+00:00", "revision_history": [ { "date": "2021-04-19T13:22:34+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "9.14.1", "product": { "name": "9.14.1", "product_id": "CSAFPID-278380" } }, { "category": "service_pack", "name": "9.14.1.10", "product": { "name": "9.14.1.10", "product_id": "CSAFPID-278725" } }, { "category": "service_pack", "name": "9.14.1.6", "product": { "name": "9.14.1.6", "product_id": "CSAFPID-278754" } }, { "category": "service_pack", "name": "9.14.1.15", "product": { "name": "9.14.1.15", "product_id": "CSAFPID-278807" } }, { "category": "service_pack", "name": "9.14.1.19", "product": { "name": "9.14.1.19", "product_id": "CSAFPID-279344" } }, { "category": "service_pack", "name": "9.14.1.30", "product": { "name": "9.14.1.30", "product_id": "CSAFPID-280409" } }, { "category": "service_pack", "name": "9.14.2", "product": { "name": "9.14.2", "product_id": "CSAFPID-281571" } }, { "category": "service_pack", "name": "9.14.2.4", "product": { "name": "9.14.2.4", "product_id": "CSAFPID-281572" } }, { "category": "service_pack", "name": "9.14.2.8", "product": { "name": "9.14.2.8", "product_id": "CSAFPID-281573" } } ], "category": "product_version", "name": "9.14" } ], "category": "product_family", "name": "Cisco Adaptive Security Appliance (ASA) Software" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "6.6.0", "product": { "name": "6.6.0", "product_id": "CSAFPID-225862" } }, { "category": "service_pack", "name": "6.6.0.1", "product": { "name": "6.6.0.1", "product_id": "CSAFPID-278885" } }, { "category": "service_pack", "name": "6.6.1", "product": { "name": "6.6.1", "product_id": "CSAFPID-280013" } } ], "category": "product_version", "name": "6.6" } ], "category": "product_family", "name": "Cisco Firepower Threat Defense Software" }, { "category": "product_name", "name": "Cisco Firepower 2100 Series", "product": { "name": "Cisco Firepower 2100 Series", "product_id": "CSAFPID-277392" } }, { "category": "product_name", "name": "Cisco Firepower 1000 Series", "product": { "name": "Cisco Firepower 1000 Series", "product_id": "CSAFPID-277393" } }, { "category": "product_name", "name": "Cisco ASA 5500-X Series Firewalls", "product": { "name": "Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-277437" } }, { "category": "product_name", "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product": { "name": "Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-277438" } }, { "category": "product_name", "name": "Cisco Firepower 9000 Series", "product": { "name": "Cisco Firepower 9000 Series", "product_id": "CSAFPID-277440" } }, { "category": "product_name", "name": "Cisco Firepower 4100 Series", "product": { "name": "Cisco Firepower 4100 Series", "product_id": "CSAFPID-277441" } }, { "category": "product_name", "name": "Cisco Adaptive Security Virtual Appliance (ASAv)", "product": { "name": "Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-277511" } }, { "category": "product_name", "name": "Cisco Secure Firewall Threat Defense Virtual", "product": { "name": "Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-277464" } } ], "category": "vendor", "name": "Cisco" } ], "relationships": [ { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278380:277392" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278380:277393" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278380:277437" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278380:277438" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278380:277440" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278380:277441" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278380:277511" }, "product_reference": "CSAFPID-278380", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278725:277392" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278725:277393" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278725:277437" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278725:277438" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278725:277440" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278725:277441" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.10 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278725:277511" }, "product_reference": "CSAFPID-278725", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.6 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278754:277511" }, "product_reference": "CSAFPID-278754", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278807:277392" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278807:277393" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278807:277437" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278807:277438" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278807:277440" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278807:277441" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.15 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-278807:277511" }, "product_reference": "CSAFPID-278807", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-279344:277392" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-279344:277393" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-279344:277437" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-279344:277438" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-279344:277440" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-279344:277441" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.19 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-279344:277511" }, "product_reference": "CSAFPID-279344", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-280409:277392" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-280409:277393" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-280409:277437" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-280409:277438" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-280409:277440" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-280409:277441" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.1.30 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-280409:277511" }, "product_reference": "CSAFPID-280409", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281571:277392" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281571:277393" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281571:277437" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281571:277438" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281571:277440" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281571:277441" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281571:277511" }, "product_reference": "CSAFPID-281571", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281572:277392" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281572:277393" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281572:277437" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281572:277438" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281572:277440" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281572:277441" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.4 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281572:277511" }, "product_reference": "CSAFPID-281572", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-281573:277392" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-281573:277393" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-281573:277437" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-281573:277438" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-281573:277440" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-281573:277441" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Adaptive Security Appliance (ASA) Software 9.14.2.8 when installed on Cisco Adaptive Security Virtual Appliance (ASAv)", "product_id": "CSAFPID-281573:277511" }, "product_reference": "CSAFPID-281573", "relates_to_product_reference": "CSAFPID-277511" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-225862:277392" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-225862:277393" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-225862:277437" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-225862:277438" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-225862:277440" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-225862:277441" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-225862:277464" }, "product_reference": "CSAFPID-225862", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-278885:277392" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-278885:277393" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-278885:277437" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-278885:277438" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-278885:277440" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-278885:277441" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.0.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-278885:277464" }, "product_reference": "CSAFPID-278885", "relates_to_product_reference": "CSAFPID-277464" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 2100 Series", "product_id": "CSAFPID-280013:277392" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277392" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 1000 Series", "product_id": "CSAFPID-280013:277393" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277393" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco ASA 5500-X Series Firewalls", "product_id": "CSAFPID-280013:277437" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277437" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco 3000 Series Industrial Security Appliances (ISA)", "product_id": "CSAFPID-280013:277438" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277438" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 9000 Series", "product_id": "CSAFPID-280013:277440" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277440" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Firepower 4100 Series", "product_id": "CSAFPID-280013:277441" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277441" }, { "category": "installed_on", "full_product_name": { "name": "Cisco Firepower Threat Defense Software 6.6.1 when installed on Cisco Secure Firewall Threat Defense Virtual", "product_id": "CSAFPID-280013:277464" }, "product_reference": "CSAFPID-280013", "relates_to_product_reference": "CSAFPID-277464" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-1476", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvx05381" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511", "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464" ] }, "release_date": "2021-04-28T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464", "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-278380:277392", "CSAFPID-278380:277393", "CSAFPID-278380:277437", "CSAFPID-278380:277438", "CSAFPID-278380:277440", "CSAFPID-278380:277441", "CSAFPID-278380:277511", "CSAFPID-278725:277392", "CSAFPID-278725:277393", "CSAFPID-278725:277437", "CSAFPID-278725:277438", "CSAFPID-278725:277440", "CSAFPID-278725:277441", "CSAFPID-278725:277511", "CSAFPID-278754:277511", "CSAFPID-278807:277392", "CSAFPID-278807:277393", "CSAFPID-278807:277437", "CSAFPID-278807:277438", "CSAFPID-278807:277440", "CSAFPID-278807:277441", "CSAFPID-278807:277511", "CSAFPID-279344:277392", "CSAFPID-279344:277393", "CSAFPID-279344:277437", "CSAFPID-279344:277438", "CSAFPID-279344:277440", "CSAFPID-279344:277441", "CSAFPID-279344:277511", "CSAFPID-280409:277392", "CSAFPID-280409:277393", "CSAFPID-280409:277437", "CSAFPID-280409:277438", "CSAFPID-280409:277440", "CSAFPID-280409:277441", "CSAFPID-280409:277511", "CSAFPID-281571:277392", "CSAFPID-281571:277393", "CSAFPID-281571:277437", "CSAFPID-281571:277438", "CSAFPID-281571:277440", "CSAFPID-281571:277441", "CSAFPID-281571:277511", "CSAFPID-281572:277392", "CSAFPID-281572:277393", "CSAFPID-281572:277437", "CSAFPID-281572:277438", "CSAFPID-281572:277440", "CSAFPID-281572:277441", "CSAFPID-281572:277511", "CSAFPID-281573:277392", "CSAFPID-281573:277393", "CSAFPID-281573:277437", "CSAFPID-281573:277438", "CSAFPID-281573:277440", "CSAFPID-281573:277441", "CSAFPID-281573:277511", "CSAFPID-225862:277392", "CSAFPID-225862:277393", "CSAFPID-225862:277437", "CSAFPID-225862:277438", "CSAFPID-225862:277440", "CSAFPID-225862:277441", "CSAFPID-225862:277464", "CSAFPID-278885:277392", "CSAFPID-278885:277393", "CSAFPID-278885:277437", "CSAFPID-278885:277438", "CSAFPID-278885:277440", "CSAFPID-278885:277441", "CSAFPID-278885:277464", "CSAFPID-280013:277392", "CSAFPID-280013:277393", "CSAFPID-280013:277437", "CSAFPID-280013:277438", "CSAFPID-280013:277440", "CSAFPID-280013:277441", "CSAFPID-280013:277464" ] } ], "title": "Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Command Injection Vulnerability" } ] }
cnvd-2021-50583
Vulnerability from cnvd
Title: Cisco Adaptive Security Appliance和Firepower Threat Defense命令注入漏洞
Description:
Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliance都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliance是一个网络设备。用于保护各种规模的公司网络和数据中心。
Cisco Adaptive Security Appliance 9.13版和Firepower Threat Defense 6.5版的CLI存在命令注入漏洞,攻击者可通过提交特制输入利用该漏洞以root权限在底层OS上执行命令。
Severity: 高
Patch Name: Cisco Adaptive Security Appliance和Firepower Threat Defense命令注入漏洞的补丁
Patch Description:
Cisco Firepower Threat Defense(FTD)和Cisco Adaptive Security Appliance都是美国思科(Cisco)公司的产品。Cisco Firepower Threat Defense是一套提供下一代防火墙服务的统一软件。Cisco Adaptive Security Appliance是一个网络设备。用于保护各种规模的公司网络和数据中心。
Cisco Adaptive Security Appliance 9.13版和Firepower Threat Defense 6.5版的CLI存在命令注入漏洞,攻击者可通过提交特制输入利用该漏洞以root权限在底层OS上执行命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG
Reference: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG
Name | ['Cisco Adaptive Security Appliances 9.13', 'Cisco Firepower Threat Defense 6.5'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-1476", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-1476" } }, "description": "Cisco Firepower Threat Defense\uff08FTD\uff09\u548cCisco Adaptive Security Appliance\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco Firepower Threat Defense\u662f\u4e00\u5957\u63d0\u4f9b\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\u670d\u52a1\u7684\u7edf\u4e00\u8f6f\u4ef6\u3002Cisco Adaptive Security Appliance\u662f\u4e00\u4e2a\u7f51\u7edc\u8bbe\u5907\u3002\u7528\u4e8e\u4fdd\u62a4\u5404\u79cd\u89c4\u6a21\u7684\u516c\u53f8\u7f51\u7edc\u548c\u6570\u636e\u4e2d\u5fc3\u3002\n\nCisco Adaptive Security Appliance 9.13\u7248\u548cFirepower Threat Defense 6.5\u7248\u7684CLI\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u5728\u5e95\u5c42OS\u4e0a\u6267\u884c\u547d\u4ee4\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2021-50583", "openTime": "2021-07-14", "patchDescription": "Cisco Firepower Threat Defense\uff08FTD\uff09\u548cCisco Adaptive Security Appliance\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco Firepower Threat Defense\u662f\u4e00\u5957\u63d0\u4f9b\u4e0b\u4e00\u4ee3\u9632\u706b\u5899\u670d\u52a1\u7684\u7edf\u4e00\u8f6f\u4ef6\u3002Cisco Adaptive Security Appliance\u662f\u4e00\u4e2a\u7f51\u7edc\u8bbe\u5907\u3002\u7528\u4e8e\u4fdd\u62a4\u5404\u79cd\u89c4\u6a21\u7684\u516c\u53f8\u7f51\u7edc\u548c\u6570\u636e\u4e2d\u5fc3\u3002\r\n\r\nCisco Adaptive Security Appliance 9.13\u7248\u548cFirepower Threat Defense 6.5\u7248\u7684CLI\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u63d0\u4ea4\u7279\u5236\u8f93\u5165\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u5728\u5e95\u5c42OS\u4e0a\u6267\u884c\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco Adaptive Security Appliance\u548cFirepower Threat Defense\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Cisco Adaptive Security Appliances 9.13", "Cisco Firepower Threat Defense 6.5" ] }, "referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG", "serverity": "\u9ad8", "submitTime": "2021-04-29", "title": "Cisco Adaptive Security Appliance\u548cFirepower Threat Defense\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e" }
ghsa-pw27-8v69-r7p3
Vulnerability from github
A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.
{ "affected": [], "aliases": [ "CVE-2021-1476" ], "database_specific": { "cwe_ids": [ "CWE-78" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-04-29T18:15:00Z", "severity": "HIGH" }, "details": "A vulnerability in the CLI of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying OS with root privileges. To exploit this vulnerability, an attacker must have valid administrator-level credentials.", "id": "GHSA-pw27-8v69-r7p3", "modified": "2023-08-16T18:30:19Z", "published": "2022-05-24T17:49:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1476" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-cmd-inj-SELprvG" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.