Rewterz Threat Advisory – CVE-2021-1518 – Cisco Firepower Device Manager Code Execution
July 22, 2021Rewterz Threat Advisory –Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities
July 22, 2021Rewterz Threat Advisory – CVE-2021-1518 – Cisco Firepower Device Manager Code Execution
July 22, 2021Rewterz Threat Advisory –Cisco Intersight Virtual Appliance IPv4 and IPv6 Forwarding Vulnerabilities
July 22, 2021Severity
Medium
Analysis Summary
CVE-2021-1614
A vulnerability in the Multiprotocol Label Switching (MPLS) packet handling function of Cisco SD-WAN Software could allow an unauthenticated, remote attacker to gain access to information stored in MPLS buffer memory. This vulnerability is due to insufficient handling of malformed MPLS packets that are processed by a device that is running Cisco SD-WAN Software. An attacker could exploit this vulnerability by sending a crafted MPLS packet to an affected device that is running Cisco SD-WAN Software or Cisco SD-WAN vManage Software. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
CVE-2021-34700
A vulnerability in the CLI interface of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to read arbitrary files on the underlying file system of an affected system. This vulnerability exists because access to sensitive information on an affected system is not sufficiently controlled. An attacker could exploit this vulnerability by gaining unauthorized access to sensitive information on an affected system. A successful exploit could allow the attacker to create forged authentication requests and gain unauthorized access to the web UI of an affected system.
Impact
- Information Theft
- Unauthorized Access
Affected Vendors
Cisco
Affected Products
- Cisco SD-WAN Software
- Cisco SD-WAN vManage Earlier than 20.4.2
- Cisco SD-WAN vManage Earlier than 20.5.1
Remediation
Refer to Cisco Security Advisory for the patch, upgrade, or suggested workaround information.