CVE-2021-1512

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the underlying file system of an affected system. This vulnerability is due to insufficient validation of the user-supplied input parameters of a specific CLI command. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content in any arbitrary files that reside on the underlying host file system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:vsmart_controller_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vsmart_controller:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:cisco:vedge_100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:cisco:vedge_1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:cisco:vedge_100b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:cisco:vedge_100m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:cisco:vedge_100wm_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:cisco:vedge_2000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:cisco:vedge_5000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:cisco:vedge-100b_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:cisco:vedge_cloud_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:44

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-arbfile-7Qhd9mCn - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-arbfile-7Qhd9mCn - Vendor Advisory

16 Oct 2023, 16:35

Type Values Removed Values Added
CPE cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
First Time Cisco catalyst Sd-wan Manager

Information

Published : 2021-05-06 13:15

Updated : 2024-11-21 05:44


NVD link : CVE-2021-1512

Mitre link : CVE-2021-1512

CVE.ORG link : CVE-2021-1512


JSON object : View

Products Affected

cisco

  • vedge_1000_firmware
  • vedge_100m_firmware
  • vedge_100b_firmware
  • vedge_cloud_firmware
  • sd-wan_vmanage
  • vedge_100
  • vedge_5000_firmware
  • vedge-100b_firmware
  • vedge_cloud
  • vedge_1000
  • vedge_100wm_firmware
  • sd-wan_vbond_orchestrator
  • vedge_5000
  • vedge_100wm
  • vedge_2000
  • vedge_2000_firmware
  • vsmart_controller_firmware
  • vedge_100b
  • catalyst_sd-wan_manager
  • vedge-100b
  • vedge_100m
  • vsmart_controller
  • vedge_100_firmware
CWE
CWE-552

Files or Directories Accessible to External Parties