mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
536 lines
18 KiB
JSON
536 lines
18 KiB
JSON
{
|
|
"id": "CVE-2021-34718",
|
|
"sourceIdentifier": "ykramarz@cisco.com",
|
|
"published": "2021-09-09T05:15:11.103",
|
|
"lastModified": "2021-09-21T20:01:30.953",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the SSH Server process of Cisco IOS XR Software could allow an authenticated, remote attacker to overwrite and read arbitrary files on the local device. This vulnerability is due to insufficient input validation of arguments that are supplied by the user for a specific file transfer method. An attacker with lower-level privileges could exploit this vulnerability by specifying Secure Copy Protocol (SCP) parameters when authenticating to a device. A successful exploit could allow the attacker to elevate their privileges and retrieve and upload files on a device that they should not have access to."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Una vulnerabilidad en el proceso del servidor SSH de Cisco IOS XR Software podr\u00eda permitir a un atacante remoto autenticado sobrescribir y leer archivos arbitrario en el dispositivo local. Esta vulnerabilidad es debido a una insuficiente comprobaci\u00f3n de entrada de los argumentos suministrados por el usuario para un m\u00e9todo espec\u00edfico de transferencia de archivos. Un atacante con privilegios de nivel inferior podr\u00eda explotar esta vulnerabilidad al especificar par\u00e1metros del Protocolo de Copia Segura (SCP) cuando se autentifica en un dispositivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante elevar sus privilegios y recuperar y cargar archivos en un dispositivo al que no deber\u00eda tener acceso"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.1,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.2
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "SINGLE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 8.5
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.0,
|
|
"impactScore": 9.2,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-88"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "ykramarz@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-88"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9000v-v2:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DB91BE23-C710-473F-8E43-0E0DE760F8AD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "324C97E6-1810-404F-9F45-6240F99FF039"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57EB55BB-41B7-40A1-B6F5-142FE8AB4C16"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "433F4A82-04A4-4EAA-8C19-F7581DCD8D29"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2D5E60AB-94FF-448A-89D8-5D2197E21C74"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "91474DBC-FB31-4DDF-96C5-311FA1D53A74"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FA241214-2F05-4360-9B50-385355E29CF4"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A93212A4-50AB-42E7-89A4-5FBBAEA050C3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDA53A61-98B3-458C-8893-61CD7D6B1E48"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F396564E-B477-4A27-A189-CEB737552E25"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5445CC54-ACFB-4070-AF26-F91FEAA85181"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ios_xrv:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F39CC9A-297B-428A-82B4-BA0B83AA85CD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ios_xrv_9000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EEE98C3E-67E2-43A3-AEA9-1575F2B93A78"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_520:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5249FE7A-FAAE-42C4-9250-DF4B2009F420"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BC7AE6C1-B7C6-4056-9719-B5CFF71970AD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_540_fronthaul:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F9C17E4B-1B14-42F2-BCE6-2D5020625382"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_560-4:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BB01E968-E838-4D3C-B603-BF7E4E0F8A2C"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_560-7:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08864A59-0840-4407-8D30-9CE34BAF05E7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2A8C028-107B-4410-BCC6-5BCB8DB63603"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DA13FE67-F4AE-46DF-921B-3FB91BDF742B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "98622F14-CC47-45E0-85E4-A7243309487C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_4009:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F40E779D-5865-4E4B-AE2D-CF1860BA19E2"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_4016:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC6A867F-E809-4CB5-82DB-2670CB0A6359"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0A972EFE-4F7E-4BFC-8631-66A2D16B74A3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B254955-C485-45D7-A19B-E78CE1D997AD"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7F72AEF0-EE70-40F8-B52B-1390820B87BB"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "50C7B71A-2559-4E90-BAAA-C6FAAFE35FC3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "43D21B01-A754-474F-8E46-14D733AB307E"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "17D6424C-972F-459C-B8F7-04FFD9F541BC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "523058BF-DE14-4FAD-8A67-C8CA795032D9"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61AF653C-DCD4-4B20-A555-71120F9A5BB9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.3.2",
|
|
"matchCriteriaId": "E3970EB8-C75E-4610-9772-A7BD0CF4B018"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "7.4.0",
|
|
"versionEndExcluding": "7.4.1",
|
|
"matchCriteriaId": "42290FCA-82E3-4D64-801C-F65FF4CAAFBD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0F6E0FBE-70B7-413C-8943-39BEFE050298"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "37AE5FB0-D9A6-4EBE-9F7F-243299AE918B"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "60C9AAF8-4C5B-4EF5-B575-8235F3C54BCC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-inject-QwZOCv2",
|
|
"source": "ykramarz@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |