Lucene search

K
nvd[email protected]NVD:CVE-2021-1391
HistoryMar 24, 2021 - 8:15 p.m.

CVE-2021-1391

2021-03-2420:15:13
CWE-489
web.nvd.nist.gov
4
vulnerability
cisco
ios xe software
privilege escalation
dragonite debugger
local attacker
consent token mechanism
root privilege

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.

Affected configurations

Nvd
Node
ciscoiosMatch12.2\(6\)i1
OR
ciscoiosMatch15.0\(2\)se13a
OR
ciscoiosMatch15.1\(3\)svr1
OR
ciscoiosMatch15.1\(3\)svr2
OR
ciscoiosMatch15.1\(3\)svr3
OR
ciscoiosMatch15.1\(3\)svs
OR
ciscoiosMatch15.1\(3\)svs1
OR
ciscoiosMatch15.2\(4\)ea10
OR
ciscoiosMatch15.2\(5\)e
OR
ciscoiosMatch15.2\(5\)e1
OR
ciscoiosMatch15.2\(5\)e2
OR
ciscoiosMatch15.2\(5\)e2b
OR
ciscoiosMatch15.2\(5\)e2c
OR
ciscoiosMatch15.2\(5\)ea
OR
ciscoiosMatch15.2\(5\)ex
OR
ciscoiosMatch15.2\(5a\)e
OR
ciscoiosMatch15.2\(5a\)e1
OR
ciscoiosMatch15.2\(5b\)e
OR
ciscoiosMatch15.2\(5c\)e
OR
ciscoiosMatch15.2\(6\)e
OR
ciscoiosMatch15.2\(6\)e0a
OR
ciscoiosMatch15.2\(6\)e0c
OR
ciscoiosMatch15.2\(6\)e1
OR
ciscoiosMatch15.2\(6\)e1a
OR
ciscoiosMatch15.2\(6\)e1s
OR
ciscoiosMatch15.2\(6\)e2
OR
ciscoiosMatch15.2\(6\)e2a
OR
ciscoiosMatch15.2\(6\)e2b
OR
ciscoiosMatch15.2\(6\)e3
OR
ciscoiosMatch15.2\(6\)eb
OR
ciscoiosMatch15.2\(7\)e
OR
ciscoiosMatch15.2\(7\)e0a
OR
ciscoiosMatch15.2\(7\)e0b
OR
ciscoiosMatch15.2\(7\)e0s
OR
ciscoiosMatch15.2\(7\)e1
OR
ciscoiosMatch15.2\(7\)e1a
OR
ciscoiosMatch15.2\(7\)e2
OR
ciscoiosMatch15.2\(7\)e2a
OR
ciscoiosMatch15.2\(7\)e2b
OR
ciscoiosMatch15.2\(7\)e3
OR
ciscoiosMatch15.2\(7\)e3k
OR
ciscoiosMatch15.2\(7a\)e0b
OR
ciscoiosMatch15.2\(7b\)e0b
OR
ciscoiosMatch15.3\(3\)jf13
OR
ciscoios_xeMatch3.9.0e
OR
ciscoios_xeMatch3.9.1e
OR
ciscoios_xeMatch3.9.2be
OR
ciscoios_xeMatch3.9.2e
OR
ciscoios_xeMatch3.10.0ce
OR
ciscoios_xeMatch3.10.0e
OR
ciscoios_xeMatch3.10.1ae
OR
ciscoios_xeMatch3.10.1e
OR
ciscoios_xeMatch3.10.1se
OR
ciscoios_xeMatch3.10.2e
OR
ciscoios_xeMatch3.10.3e
OR
ciscoios_xeMatch3.11.0e
OR
ciscoios_xeMatch3.11.1ae
OR
ciscoios_xeMatch3.11.1e
OR
ciscoios_xeMatch3.11.2ae
OR
ciscoios_xeMatch3.11.2e
OR
ciscoios_xeMatch3.11.3ae
OR
ciscoios_xeMatch3.11.3e
OR
ciscoios_xeMatch16.8.1
OR
ciscoios_xeMatch16.8.1a
OR
ciscoios_xeMatch16.8.1b
OR
ciscoios_xeMatch16.8.1c
OR
ciscoios_xeMatch16.8.1d
OR
ciscoios_xeMatch16.8.1e
OR
ciscoios_xeMatch16.8.1s
OR
ciscoios_xeMatch16.8.2
OR
ciscoios_xeMatch16.8.3
OR
ciscoios_xeMatch16.9.1
OR
ciscoios_xeMatch16.9.1a
OR
ciscoios_xeMatch16.9.1b
OR
ciscoios_xeMatch16.9.1c
OR
ciscoios_xeMatch16.9.1d
OR
ciscoios_xeMatch16.9.1s
OR
ciscoios_xeMatch16.9.2
OR
ciscoios_xeMatch16.9.2a
OR
ciscoios_xeMatch16.9.2s
OR
ciscoios_xeMatch16.9.3
OR
ciscoios_xeMatch16.9.3a
OR
ciscoios_xeMatch16.9.3h
OR
ciscoios_xeMatch16.9.3s
OR
ciscoios_xeMatch16.9.4
OR
ciscoios_xeMatch16.9.4c
OR
ciscoios_xeMatch16.9.5
OR
ciscoios_xeMatch16.9.5f
OR
ciscoios_xeMatch16.9.6
OR
ciscoios_xeMatch16.10.1
OR
ciscoios_xeMatch16.10.1a
OR
ciscoios_xeMatch16.10.1b
OR
ciscoios_xeMatch16.10.1c
OR
ciscoios_xeMatch16.10.1d
OR
ciscoios_xeMatch16.10.1e
OR
ciscoios_xeMatch16.10.1f
OR
ciscoios_xeMatch16.10.1g
OR
ciscoios_xeMatch16.10.1s
OR
ciscoios_xeMatch16.10.2
OR
ciscoios_xeMatch16.10.3
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1b
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.1s
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t
OR
ciscoios_xeMatch16.12.1w
OR
ciscoios_xeMatch16.12.1x
OR
ciscoios_xeMatch16.12.1y
OR
ciscoios_xeMatch16.12.1z
OR
ciscoios_xeMatch16.12.1za
OR
ciscoios_xeMatch16.12.2
OR
ciscoios_xeMatch16.12.2a
OR
ciscoios_xeMatch16.12.2s
OR
ciscoios_xeMatch16.12.2t
OR
ciscoios_xeMatch16.12.3
OR
ciscoios_xeMatch16.12.3a
OR
ciscoios_xeMatch16.12.3s
OR
ciscoios_xeMatch17.1.1
OR
ciscoios_xeMatch17.1.1a
OR
ciscoios_xeMatch17.1.1s
OR
ciscoios_xeMatch17.1.1t
OR
ciscoios_xeMatch17.1.2
OR
ciscoios_xeMatch17.2.1
OR
ciscoios_xeMatch17.2.1a
OR
ciscoios_xeMatch17.2.1r
OR
ciscoios_xeMatch17.2.1v
OR
ciscoios_xeMatch17.2.2
OR
ciscoios_xeMatch17.2.3
VendorProductVersionCPE
ciscoios12.2(6)i1cpe:2.3:o:cisco:ios:12.2\(6\)i1:*:*:*:*:*:*:*
ciscoios15.0(2)se13acpe:2.3:o:cisco:ios:15.0\(2\)se13a:*:*:*:*:*:*:*
ciscoios15.1(3)svr1cpe:2.3:o:cisco:ios:15.1\(3\)svr1:*:*:*:*:*:*:*
ciscoios15.1(3)svr2cpe:2.3:o:cisco:ios:15.1\(3\)svr2:*:*:*:*:*:*:*
ciscoios15.1(3)svr3cpe:2.3:o:cisco:ios:15.1\(3\)svr3:*:*:*:*:*:*:*
ciscoios15.1(3)svscpe:2.3:o:cisco:ios:15.1\(3\)svs:*:*:*:*:*:*:*
ciscoios15.1(3)svs1cpe:2.3:o:cisco:ios:15.1\(3\)svs1:*:*:*:*:*:*:*
ciscoios15.2(4)ea10cpe:2.3:o:cisco:ios:15.2\(4\)ea10:*:*:*:*:*:*:*
ciscoios15.2(5)ecpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:*
ciscoios15.2(5)e1cpe:2.3:o:cisco:ios:15.2\(5\)e1:*:*:*:*:*:*:*
Rows per page:
1-10 of 1341

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for NVD:CVE-2021-1391