Description
A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.
Published: 2021-09-23
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-21374 A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.
History

Fri, 08 Nov 2024 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco 1000 Integrated Services Router 1100-4g\/6g Integrated Services Router 1100-4p Integrated Services Router 1100-8p Integrated Services Router 1100 Integrated Services Router 1101-4p Integrated Services Router 1101 Integrated Services Router 1109-2p Integrated Services Router 1109-4p Integrated Services Router 1109 Integrated Services Router 1111x-8p Integrated Services Router 1111x Integrated Services Router 111x Integrated Services Router 1120 Integrated Services Router 1160 Integrated Services Router 4000 Integrated Services Router 4221 Integrated Services Router 422 Integrated Services Router 4321 Integrated Services Router 4331 Integrated Services Router 4351 Integrated Services Router 4431 Integrated Services Router 4451-x Integrated Services Router 4451 Integrated Services Router 4461 Integrated Services Router Asr 1000 Asr 1000-esp100 Asr 1000-x Asr 1000 Series Asr 1000 Series Route Processor \(rp2\) Asr 1000 Series Route Processor \(rp3\) Asr 1001 Asr 1001-hx Asr 1001-hx R Asr 1001-x Asr 1001-x R Asr 1002 Asr 1002-hx Asr 1002-hx R Asr 1002-x Asr 1002-x R Asr 1004 Asr 1006 Asr 1006-x Asr 1009-x Asr 1013 Asr 1023 Csr 1000v Ios Xe Sd-wan
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-07T21:58:53.498Z

Reserved: 2021-06-15T00:00:00.000Z

Link: CVE-2021-34724

cve-icon Vulnrichment

Updated: 2024-08-04T00:19:48.119Z

cve-icon NVD

Status : Modified

Published: 2021-09-23T03:15:18.813

Modified: 2024-11-21T06:11:03.303

Link: CVE-2021-34724

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses