Логотип exploitDog
bind:CVE-2021-1371
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1371

Количество 3

Количество 3

nvd логотип

CVE-2021-1371

почти 5 лет назад

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

CVSS3: 6.6
EPSS: Низкий
github логотип

GHSA-8qm4-vmvc-xrpj

больше 3 лет назад

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

CVSS3: 6.6
EPSS: Низкий
fstec логотип

BDU:2021-01814

почти 5 лет назад

Уязвимость функции управления доступом на основе ролей (RBAC) программного обеспечения Cisco IOS XE SD-WAN, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1371

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

CVSS3: 6.6
0%
Низкий
почти 5 лет назад
github логотип
GHSA-8qm4-vmvc-xrpj

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

CVSS3: 6.6
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-01814

Уязвимость функции управления доступом на основе ролей (RBAC) программного обеспечения Cisco IOS XE SD-WAN, позволяющая нарушителю повысить свои привилегии

CVSS3: 6.6
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу