// For flags

CVE-2021-1447

Cisco Content Security Management Appliance Privilege Escalation Vulnerability

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.

Una vulnerabilidad en el sistema de administración de cuentas de usuario de Cisco AsyncOS para Cisco Content Security Management Appliance (SMA) podría permitir a un atacante local autenticado elevar sus privilegios a root. Esta vulnerabilidad es debido a un fallo de procedimiento en el algoritmo de generación de contraseñas. Un atacante podría explotar esta vulnerabilidad habilitando funciones específicas solo para administradores y conectándose al dispositivo por medio de la CLI con privilegios elevados. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como root y acceder al sistema operativo subyacente. Para explotar esta vulnerabilidad, el atacante debe tener credenciales de administrador válidas

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-05-06 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-269: Improper Privilege Management
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Content Security Management Appliance
Search vendor "Cisco" for product "Content Security Management Appliance"
< 12.8.1-002
Search vendor "Cisco" for product "Content Security Management Appliance" and version " < 12.8.1-002"
-
Affected
Cisco
Search vendor "Cisco"
Content Security Management Appliance
Search vendor "Cisco" for product "Content Security Management Appliance"
>= 13.0.0-249 < 13.8.1-068
Search vendor "Cisco" for product "Content Security Management Appliance" and version " >= 13.0.0-249 < 13.8.1-068"
-
Affected