cvelist/2021/1xxx/CVE-2021-1483.json

349 lines
18 KiB
JSON
Raw Normal View History

2020-11-13 20:03:40 +00:00
{
2024-11-15 17:00:35 +00:00
"data_version": "4.0",
2020-11-13 20:03:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-1483",
2024-11-15 17:00:35 +00:00
"ASSIGNER": "psirt@cisco.com",
"STATE": "PUBLIC"
2020-11-13 20:03:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-11-15 17:00:35 +00:00
"value": "A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.\r\nThis vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Restriction of XML External Entity Reference",
"cweId": "CWE-611"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Cisco",
"product": {
"product_data": [
{
"product_name": "Cisco Catalyst SD-WAN Manager",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "20.1.12"
},
{
"version_affected": "=",
"version_value": "19.2.1"
},
{
"version_affected": "=",
"version_value": "18.4.4"
},
{
"version_affected": "=",
"version_value": "18.4.5"
},
{
"version_affected": "=",
"version_value": "20.1.1.1"
},
{
"version_affected": "=",
"version_value": "20.1.1"
},
{
"version_affected": "=",
"version_value": "19.3.0"
},
{
"version_affected": "=",
"version_value": "19.2.2"
},
{
"version_affected": "=",
"version_value": "19.2.099"
},
{
"version_affected": "=",
"version_value": "18.3.6"
},
{
"version_affected": "=",
"version_value": "18.3.7"
},
{
"version_affected": "=",
"version_value": "19.2.0"
},
{
"version_affected": "=",
"version_value": "18.3.8"
},
{
"version_affected": "=",
"version_value": "19.0.0"
},
{
"version_affected": "=",
"version_value": "19.1.0"
},
{
"version_affected": "=",
"version_value": "18.4.302"
},
{
"version_affected": "=",
"version_value": "18.4.303"
},
{
"version_affected": "=",
"version_value": "19.2.097"
},
{
"version_affected": "=",
"version_value": "19.2.098"
},
{
"version_affected": "=",
"version_value": "17.2.10"
},
{
"version_affected": "=",
"version_value": "18.3.6.1"
},
{
"version_affected": "=",
"version_value": "19.0.1a"
},
{
"version_affected": "=",
"version_value": "18.2.0"
},
{
"version_affected": "=",
"version_value": "18.4.3"
},
{
"version_affected": "=",
"version_value": "18.4.1"
},
{
"version_affected": "=",
"version_value": "17.2.8"
},
{
"version_affected": "=",
"version_value": "18.3.3.1"
},
{
"version_affected": "=",
"version_value": "18.4.0"
},
{
"version_affected": "=",
"version_value": "18.3.1"
},
{
"version_affected": "=",
"version_value": "17.2.6"
},
{
"version_affected": "=",
"version_value": "17.2.9"
},
{
"version_affected": "=",
"version_value": "18.3.4"
},
{
"version_affected": "=",
"version_value": "17.2.5"
},
{
"version_affected": "=",
"version_value": "18.3.1.1"
},
{
"version_affected": "=",
"version_value": "18.3.5"
},
{
"version_affected": "=",
"version_value": "18.4.0.1"
},
{
"version_affected": "=",
"version_value": "18.3.3"
},
{
"version_affected": "=",
"version_value": "17.2.7"
},
{
"version_affected": "=",
"version_value": "17.2.4"
},
{
"version_affected": "=",
"version_value": "18.3.0"
},
{
"version_affected": "=",
"version_value": "19.2.3"
},
{
"version_affected": "=",
"version_value": "18.4.501_ES"
},
{
"version_affected": "=",
"version_value": "20.3.1"
},
{
"version_affected": "=",
"version_value": "20.1.2"
},
{
"version_affected": "=",
"version_value": "19.2.929"
},
{
"version_affected": "=",
"version_value": "19.2.31"
},
{
"version_affected": "=",
"version_value": "20.3.2"
},
{
"version_affected": "=",
"version_value": "19.2.32"
},
{
"version_affected": "=",
"version_value": "20.3.2_925"
},
{
"version_affected": "=",
"version_value": "20.3.2.1"
},
{
"version_affected": "=",
"version_value": "20.3.2.1_927"
},
{
"version_affected": "=",
"version_value": "18.4.6"
},
{
"version_affected": "=",
"version_value": "20.1.2_937"
},
{
"version_affected": "=",
"version_value": "20.4.1"
},
{
"version_affected": "=",
"version_value": "20.3.2_928"
},
{
"version_affected": "=",
"version_value": "20.3.2_929"
},
{
"version_affected": "=",
"version_value": "20.4.1.0.1"
},
{
"version_affected": "=",
"version_value": "20.3.2.1_930"
},
{
"version_affected": "=",
"version_value": "19.2.4"
},
{
"version_affected": "=",
"version_value": "20.4.1.1"
},
{
"version_affected": "=",
"version_value": "20.3.3"
},
{
"version_affected": "=",
"version_value": "19.2.4.0.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
"refsource": "MISC",
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX"
}
]
},
"source": {
"advisory": "cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
"discovery": "INTERNAL",
"defects": [
"CSCvw93084"
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco\u00a0Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/RL:X/RC:X/E:X",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
2020-11-13 20:03:40 +00:00
}
]
}
}