Lucene search

K
nvd[email protected]NVD:CVE-2021-1451
HistoryMar 24, 2021 - 8:15 p.m.

CVE-2021-1451

2021-03-2420:15:15
CWE-119
web.nvd.nist.gov
17
cisco
vulnerability
remote code execution
easy vss protocol
buffer overflow
denial of service
linux operating system

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.9%

A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device. The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.

Affected configurations

Nvd
Node
ciscoios_xeMatch3.6.0be
OR
ciscoios_xeMatch3.6.0e
OR
ciscoios_xeMatch3.6.1e
OR
ciscoios_xeMatch3.6.2e
OR
ciscoios_xeMatch3.6.3e
OR
ciscoios_xeMatch3.6.4e
OR
ciscoios_xeMatch3.6.5ae
OR
ciscoios_xeMatch3.6.5be
OR
ciscoios_xeMatch3.6.5e
OR
ciscoios_xeMatch3.6.6e
OR
ciscoios_xeMatch3.6.7e
OR
ciscoios_xeMatch3.6.8e
OR
ciscoios_xeMatch3.6.9e
OR
ciscoios_xeMatch3.6.10e
OR
ciscoios_xeMatch3.7.0e
OR
ciscoios_xeMatch3.7.1e
OR
ciscoios_xeMatch3.7.2e
OR
ciscoios_xeMatch3.7.3e
OR
ciscoios_xeMatch3.7.4e
OR
ciscoios_xeMatch3.7.5e
OR
ciscoios_xeMatch3.8.0e
OR
ciscoios_xeMatch3.8.1e
OR
ciscoios_xeMatch3.8.2e
OR
ciscoios_xeMatch3.8.3e
OR
ciscoios_xeMatch3.8.4e
OR
ciscoios_xeMatch3.8.5ae
OR
ciscoios_xeMatch3.8.5e
OR
ciscoios_xeMatch3.8.6e
OR
ciscoios_xeMatch3.8.7e
OR
ciscoios_xeMatch3.8.8e
OR
ciscoios_xeMatch3.8.9e
OR
ciscoios_xeMatch3.8.10e
OR
ciscoios_xeMatch3.9.0e
OR
ciscoios_xeMatch3.9.1e
OR
ciscoios_xeMatch3.9.2be
OR
ciscoios_xeMatch3.9.2e
OR
ciscoios_xeMatch3.10.0ce
OR
ciscoios_xeMatch3.10.0e
OR
ciscoios_xeMatch3.10.1ae
OR
ciscoios_xeMatch3.10.1e
OR
ciscoios_xeMatch3.10.1se
OR
ciscoios_xeMatch3.10.2e
OR
ciscoios_xeMatch3.10.3e
OR
ciscoios_xeMatch3.11.0e
OR
ciscoios_xeMatch3.11.1ae
OR
ciscoios_xeMatch3.11.1e
OR
ciscoios_xeMatch3.11.2ae
OR
ciscoios_xeMatch3.11.2e
OR
ciscoios_xeMatch3.11.3ae
OR
ciscoios_xeMatch3.11.3e
OR
ciscoios_xeMatch15.2\(7\)e
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.5a
OR
ciscoios_xeMatch17.3.1
AND
linuxlinux_kernelMatch-
VendorProductVersionCPE
ciscoios_xe3.6.0becpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*
ciscoios_xe3.6.0ecpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*
ciscoios_xe3.6.1ecpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*
ciscoios_xe3.6.2ecpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*
ciscoios_xe3.6.3ecpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*
ciscoios_xe3.6.4ecpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*
ciscoios_xe3.6.5aecpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*
ciscoios_xe3.6.5becpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*
ciscoios_xe3.6.5ecpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*
ciscoios_xe3.6.6ecpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*
Rows per page:
1-10 of 551

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.9%

Related for NVD:CVE-2021-1451