A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP).
History

Sat, 09 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2021-03-24T20:05:54.399456Z

Updated: 2024-11-08T23:35:47.063Z

Reserved: 2020-11-13T00:00:00

Link: CVE-2021-1437

cve-icon Vulnrichment

Updated: 2024-08-03T16:11:17.318Z

cve-icon NVD

Status : Modified

Published: 2021-03-24T20:15:14.900

Modified: 2023-11-07T03:28:18.740

Link: CVE-2021-1437

cve-icon Redhat

No data.