// For flags

CVE-2021-1306

Cisco ADE-OS Local File Inclusion Vulnerability

Severity Score

3.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the restricted shell of Cisco Evolved Programmable Network (EPN) Manager, Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to identify directories and write arbitrary files to the file system. This vulnerability is due to improper validation of parameters that are sent to a CLI command within the restricted shell. An attacker could exploit this vulnerability by logging in to the device and issuing certain CLI commands. A successful exploit could allow the attacker to identify file directories on the affected device and write arbitrary files to the file system on the affected device. To exploit this vulnerability, the attacker must be an authenticated shell user.

Una vulnerabilidad en el shell restringido de Cisco Evolved Programmable Network (EPN) Manager, Cisco Identity Services Engine (ISE) y Cisco Prime Infrastructure, podría permitir a un atacante autenticado local identificar directorios y escribir archivos arbitrarios en el sistema de archivos. Esta vulnerabilidad es debido a una comprobación inapropiada de los parámetros que son enviados hacia un comando de CLI dentro del shell restringido. Un atacante podría explotar esta vulnerabilidad iniciando sesión en el dispositivo y emitiendo determinados comandos de CLI. Una explotación con éxito podría permitir al atacante identificar directorios de archivos en el dispositivo afectado y escribir archivos arbitrarios en el sistema de archivos del dispositivo afectado. Para explotar esta vulnerabilidad, el atacante debe ser un usuario de shell autenticado

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-05-22 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-73: External Control of File Name or Path
  • CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Evolved Programmable Network Manager
Search vendor "Cisco" for product "Evolved Programmable Network Manager"
< 5.0.1
Search vendor "Cisco" for product "Evolved Programmable Network Manager" and version " < 5.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
< 2.7.0
Search vendor "Cisco" for product "Identity Services Engine" and version " < 2.7.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
2.7.0
Search vendor "Cisco" for product "Identity Services Engine" and version "2.7.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
2.7.0
Search vendor "Cisco" for product "Identity Services Engine" and version "2.7.0"
patch2
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
3.0.0
Search vendor "Cisco" for product "Identity Services Engine" and version "3.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
3.0.0
Search vendor "Cisco" for product "Identity Services Engine" and version "3.0.0"
patch1
Affected
Cisco
Search vendor "Cisco"
Prime Infrastructure
Search vendor "Cisco" for product "Prime Infrastructure"
< 3.8.1
Search vendor "Cisco" for product "Prime Infrastructure" and version " < 3.8.1"
-
Affected
Cisco
Search vendor "Cisco"
Prime Infrastructure
Search vendor "Cisco" for product "Prime Infrastructure"
3.8.1
Search vendor "Cisco" for product "Prime Infrastructure" and version "3.8.1"
-
Affected