cvelist/2021/1xxx/CVE-2021-1619.json

86 lines
3.2 KiB
JSON
Raw Normal View History

2020-11-13 20:02:30 +00:00
{
"CVE_data_meta": {
2021-09-23 02:16:58 +00:00
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-09-22T16:00:00",
2020-11-13 20:02:30 +00:00
"ID": "CVE-2021-1619",
2021-09-23 02:16:58 +00:00
"STATE": "PUBLIC",
"TITLE": "Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability"
2020-11-13 20:02:30 +00:00
},
2021-09-23 02:16:58 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE Software ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-11-13 20:02:30 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-09-23 03:01:00 +00:00
"value": "A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS."
2020-11-13 20:02:30 +00:00
}
]
2021-09-23 02:16:58 +00:00
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "9.8",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210922 Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q"
}
]
},
"source": {
"advisory": "cisco-sa-aaa-Yx47ZT8Q",
"defect": [
[
"CSCvt53563"
]
],
"discovery": "INTERNAL"
2020-11-13 20:02:30 +00:00
}
2021-09-23 03:01:00 +00:00
}