2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-1511" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2021-05-06T13:15:10.783" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T05:44:30.937" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades en Cisco SD-WAN vEdge Software, podr\u00edan permitir a un atacante ejecutar c\u00f3digo arbitrario como usuario root o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Para obtener m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.6 ,
"impactScore" : 5.9
2023-11-07 21:03:21 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 6.5 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
2024-12-08 03:06:42 +00:00
"attackComplexity" : "LOW" ,
2023-04-24 12:24:31 +02:00
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
2024-12-08 03:06:42 +00:00
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
"impactScore" : 3.6
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:N/I:N/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-15 03:03:56 +00:00
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "7BFED2F3-4C18-4BE5-9F97-2CFCE37E7A2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "B89D5AE2-3ED3-4C57-AF93-E9750D38F029"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDE3B3E4-CE46-454C-B7A1-2A42657C7035"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "50C849A5-EBF4-4CD7-93AE-503C3E0B7A05"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "834192CC-585D-445E-B2AD-D73E9CDF3FED"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_1000_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D905B3F-094C-472C-AAAD-A4129282E942"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F019975D-3A45-4522-9CB9-F4258C371DF6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "829BA8C4-8E99-4338-817B-9F9FF37105BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "6375DFCF-2EEB-482B-AAD4-8FAB8F03C9C0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100m_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF7DE9EC-0075-4655-A888-A4ED3DB002A8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "200199EC-2819-4DE0-828C-0F56790CA1B4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "104BBAE4-C7C1-4E5A-A540-AF679FCE1CD2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100wm_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9E03BDAC-9DF0-444D-B5C8-483892B31982"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "061A302C-8D35-4E80-93DA-916DA7E90C06"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "E479E1A4-0F80-4FDC-8F9F-9E23A885179A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "584863D2-B181-4CDF-8266-EEBA56A5AA85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_2000_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BADF97B2-33D0-4A28-BDFC-CBD3A235EF5F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "140AF13E-4463-478B-AA94-97406A80CB86"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "4288CD57-CDEE-4B03-8163-7CDDE7767914"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "50C0D971-E2C4-4048-A08F-0A5D437866F8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_5000_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E998DFA-CE7F-4954-AB06-CBB15317C6A7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1356861D-E6CA-4973-9597-629507E8C07E"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.4" ,
"versionEndExcluding" : "20.4.1" ,
"matchCriteriaId" : "430D9FAC-36E8-4AB0-85F2-88D7EF1F6B7A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "20.5" ,
"versionEndExcluding" : "20.5.1" ,
"matchCriteriaId" : "DDBBDE43-BBAE-431B-AF56-73D9CC8743F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:vedge_cloud_firmware:19.2.99:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C0D58D17-951F-446E-8004-A489E3A9725E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "94999112-9EAA-4707-B002-F867D7628C49"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}