CVE-2021-1401

Multiple vulnerabilities in the web-based management interface of certain Cisco Small Business 100, 300, and 500 Series Wireless Access Points could allow an authenticated, remote attacker to obtain sensitive information from or inject arbitrary commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:wap125_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap125:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:wap131_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap131:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:wap150_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap150:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:wap351_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap351:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:wap361_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap361:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:wap581_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wap581:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:44

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN71263107/index.html - Third Party Advisory () http://jvn.jp/en/jp/JVN71263107/index.html - Third Party Advisory
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-ZAfKGXhF - Vendor Advisory
CVSS v2 : 9.0
v3 : 7.2
v2 : 9.0
v3 : 8.8

Information

Published : 2021-05-06 13:15

Updated : 2024-11-21 05:44


NVD link : CVE-2021-1401

Mitre link : CVE-2021-1401

CVE.ORG link : CVE-2021-1401


JSON object : View

Products Affected

cisco

  • wap351_firmware
  • wap150_firmware
  • wap131
  • wap125_firmware
  • wap581_firmware
  • wap361_firmware
  • wap131_firmware
  • wap351
  • wap581
  • wap361
  • wap125
  • wap150
CWE
CWE-269

Improper Privilege Management

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')