René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

561 lines
19 KiB
JSON

{
"id": "CVE-2021-1546",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2021-09-23T03:15:11.183",
"lastModified": "2021-09-30T13:22:19.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to access sensitive information. This vulnerability is due to improper protections on file access through the CLI. An attacker could exploit this vulnerability by running a CLI command that targets an arbitrary file on the local system. A successful exploit could allow the attacker to return portions of an arbitrary file, possibly resulting in the disclosure of sensitive information."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la CLI de Cisco SD-WAN Software podr\u00eda permitir a un atacante local autenticado acceder a informaci\u00f3n confidencial. Esta vulnerabilidad es debido a protecciones inapropiadas en el acceso a archivos mediante la CLI. Un atacante podr\u00eda explotar esta vulnerabilidad al ejecutar un comando de la CLI que tenga como objetivo un archivo arbitrario en el sistema local. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante devolver porciones de un archivo arbitrario, posiblemente resultando en una divulgaci\u00f3n de informaci\u00f3n confidencial"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "9F397362-BB17-4F5E-AFA3-B604A96C7BAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "15F9C222-75A1-44F8-A726-46CA77430D2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "F05A7552-5CFC-47EE-BA6B-98D423761369"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "11D28DFC-1B63-466E-A16B-F6453CB0D22E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "DC5C7C68-74C1-4D7F-848B-16C8566C0F42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "DFC2211D-F709-4170-8544-7EAED7A63D5F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "D99340DC-B83C-4F81-969F-C0A6E7CC4A54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "918ACCD9-0F3F-4EF3-8C0A-AE30F69BC8E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "6A923BEA-61C4-4A2E-A7DD-BB389FF661CB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vsmart_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF370668-127C-409B-83FE-293B830D4FB4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "F7887226-3051-4914-8B0E-5DF4296AB68E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "210F5970-F029-4E1F-97E4-0813F78CA88C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "99B58689-4FDF-4811-B1EE-584F777B696D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "F443A171-E27A-4173-BB09-77E0A1587CE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "047C57D1-C8B3-46F2-8B02-8467AF57D71A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "2FF65836-25C3-46C7-8989-9ABF3069D13F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F019975D-3A45-4522-9CB9-F4258C371DF6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "61682805-F527-473D-970A-B68053889AC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "B1ECE5A2-ED32-4453-A0FC-78A3D0D4F554"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "E3A99ECD-E6FE-4BF8-BE6D-22005B5E387A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "3E00BBD5-A34A-47EF-9BCA-7100D2282A72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "F42BACEF-31BE-4FEF-8BD3-8EC2D5A59194"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "00A3ECC6-E30A-4611-9872-8C6133F4A0C6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "449AC46F-BE53-4706-A448-83A848492637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "42659BBF-8707-4DAC-8A5D-0E9DC10DD68F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "D9899709-00DD-4934-9A54-3FDB171C2E74"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "A27667C1-0EF2-419D-A216-83FBC3F5A61E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "6954D048-EE8D-4923-9F10-18FD941AF72A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "95ED1F5D-5573-4886-A875-10DD93AE495B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "140AF13E-4463-478B-AA94-97406A80CB86"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "FB95804D-0357-4F33-ABB2-AB04C34D3095"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "DAE58206-30C8-4734-B5BB-1FD631351F49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "BCB1732D-73DA-4125-A2FE-A79435B550AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1356861D-E6CA-4973-9597-629507E8C07E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "18.4",
"versionEndExcluding": "20.4.2",
"matchCriteriaId": "56637DFC-FD0A-4714-9988-2DE80B3FB7BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.5",
"versionEndExcluding": "20.5.2",
"matchCriteriaId": "00C2DEED-5833-4E13-BBB3-5E5FE837979D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "20.6",
"versionEndExcluding": "20.6.1",
"matchCriteriaId": "6BF84BFB-E819-4C59-B16D-B00508218CE3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94999112-9EAA-4707-B002-F867D7628C49"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-Fhqh8pKX",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}