A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1100 Integrated Services Router
Subscribe
Aironet 1540
Subscribe
Aironet 1560
Subscribe
Aironet 1800
Subscribe
Aironet 2800
Subscribe
Aironet 3800
Subscribe
Aironet 4800
Subscribe
Aironet Access Point Software
Subscribe
Catalyst 9100
Subscribe
Catalyst 9800
Subscribe
Catalyst 9800 Firmware
Subscribe
Catalyst Iw6300
Subscribe
Esw6300
Subscribe
Wireless Lan Controller Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-6916 | A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 09 Nov 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-08T23:34:48.853Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1449
Updated: 2024-08-03T16:11:17.222Z
Status : Modified
Published: 2021-03-24T20:15:15.400
Modified: 2024-11-21T05:44:23.367
Link: CVE-2021-1449
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD