mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
486 lines
15 KiB
JSON
486 lines
15 KiB
JSON
{
|
|
"id": "CVE-2021-1510",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2021-05-06T13:15:10.753",
|
|
"lastModified": "2024-11-21T05:44:30.783",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "M\u00faltiples vulnerabilidades en Cisco SD-WAN vEdge Software, podr\u00edan permitir a un atacante ejecutar c\u00f3digo arbitrario como usuario root o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Para obtener m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.6,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"baseScore": 5.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "PARTIAL"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-119"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "7BFED2F3-4C18-4BE5-9F97-2CFCE37E7A2E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "B89D5AE2-3ED3-4C57-AF93-E9750D38F029"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FDE3B3E4-CE46-454C-B7A1-2A42657C7035"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "50C849A5-EBF4-4CD7-93AE-503C3E0B7A05"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "834192CC-585D-445E-B2AD-D73E9CDF3FED"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9D905B3F-094C-472C-AAAD-A4129282E942"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F019975D-3A45-4522-9CB9-F4258C371DF6"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "829BA8C4-8E99-4338-817B-9F9FF37105BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "6375DFCF-2EEB-482B-AAD4-8FAB8F03C9C0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF7DE9EC-0075-4655-A888-A4ED3DB002A8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "200199EC-2819-4DE0-828C-0F56790CA1B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "104BBAE4-C7C1-4E5A-A540-AF679FCE1CD2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9E03BDAC-9DF0-444D-B5C8-483892B31982"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "E479E1A4-0F80-4FDC-8F9F-9E23A885179A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "584863D2-B181-4CDF-8266-EEBA56A5AA85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BADF97B2-33D0-4A28-BDFC-CBD3A235EF5F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "140AF13E-4463-478B-AA94-97406A80CB86"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "4288CD57-CDEE-4B03-8163-7CDDE7767914"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "50C0D971-E2C4-4048-A08F-0A5D437866F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1E998DFA-CE7F-4954-AB06-CBB15317C6A7"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1356861D-E6CA-4973-9597-629507E8C07E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.4",
|
|
"versionEndExcluding": "20.4.1",
|
|
"matchCriteriaId": "430D9FAC-36E8-4AB0-85F2-88D7EF1F6B7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "20.5",
|
|
"versionEndExcluding": "20.5.1",
|
|
"matchCriteriaId": "DDBBDE43-BBAE-431B-AF56-73D9CC8743F7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:19.2.99:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C0D58D17-951F-446E-8004-A489E3A9725E"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "94999112-9EAA-4707-B002-F867D7628C49"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |