CVE-2021-1600

Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from an external interface. These vulnerabilities are due to insufficient restrictions for IPv4 or IPv6 packets that are received on the external management interface. An attacker could exploit these vulnerabilities by sending specific traffic to this interface on an affected device. A successful exploit could allow the attacker to access sensitive internal services and make configuration changes on the affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:intersight_virtual_appliance:1.0\(1\):*:*:*:*:*:*:*

History

21 Nov 2024, 05:44

Type Values Removed Values Added
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-iptaclbp-L8Dzs8m8 - Patch, Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsi2-iptaclbp-L8Dzs8m8 - Patch, Vendor Advisory

Information

Published : 2021-07-22 16:15

Updated : 2024-11-21 05:44


NVD link : CVE-2021-1600

Mitre link : CVE-2021-1600

CVE.ORG link : CVE-2021-1600


JSON object : View

Products Affected

cisco

  • intersight_virtual_appliance
CWE
CWE-284

Improper Access Control

NVD-CWE-Other