René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

480 lines
15 KiB
JSON

{
"id": "CVE-2021-1509",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-05-06T13:15:10.723",
"lastModified": "2023-02-16T03:24:33.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in Cisco SD-WAN vEdge Software could allow an attacker to execute arbitrary code as the root user or cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en Cisco SD-WAN vEdge Software, podr\u00edan permitir a un atacante ejecutar c\u00f3digo arbitrario como usuario root o causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Para obtener m\u00e1s informaci\u00f3n sobre estas vulnerabilidades, consulte la secci\u00f3n Detalles de este aviso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "7BFED2F3-4C18-4BE5-9F97-2CFCE37E7A2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "B89D5AE2-3ED3-4C57-AF93-E9750D38F029"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE3B3E4-CE46-454C-B7A1-2A42657C7035"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "50C849A5-EBF4-4CD7-93AE-503C3E0B7A05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "834192CC-585D-445E-B2AD-D73E9CDF3FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "9D905B3F-094C-472C-AAAD-A4129282E942"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F019975D-3A45-4522-9CB9-F4258C371DF6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "829BA8C4-8E99-4338-817B-9F9FF37105BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "6375DFCF-2EEB-482B-AAD4-8FAB8F03C9C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7DE9EC-0075-4655-A888-A4ED3DB002A8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "200199EC-2819-4DE0-828C-0F56790CA1B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "104BBAE4-C7C1-4E5A-A540-AF679FCE1CD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "9E03BDAC-9DF0-444D-B5C8-483892B31982"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "E479E1A4-0F80-4FDC-8F9F-9E23A885179A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "584863D2-B181-4CDF-8266-EEBA56A5AA85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "BADF97B2-33D0-4A28-BDFC-CBD3A235EF5F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "140AF13E-4463-478B-AA94-97406A80CB86"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "4288CD57-CDEE-4B03-8163-7CDDE7767914"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "50C0D971-E2C4-4048-A08F-0A5D437866F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "1E998DFA-CE7F-4954-AB06-CBB15317C6A7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1356861D-E6CA-4973-9597-629507E8C07E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "12136AD8-9113-46B9-B6A9-0C330ABB05B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "772B02D0-4C02-4C27-AAA4-AF0BAF00A047"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.4",
"versionEndExcluding": "20.4.1",
"matchCriteriaId": "430D9FAC-36E8-4AB0-85F2-88D7EF1F6B7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.1",
"matchCriteriaId": "DDBBDE43-BBAE-431B-AF56-73D9CC8743F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:19.2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D58D17-951F-446E-8004-A489E3A9725E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94999112-9EAA-4707-B002-F867D7628C49"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-buffover-MWGucjtO",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}