// For flags

CVE-2021-1585

Cisco Adaptive Security Device Manager Remote Code Execution Vulnerability

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher could allow an unauthenticated, remote attacker to execute arbitrary code on a user's operating system. This vulnerability is due to a lack of proper signature verification for specific code exchanged between the ASDM and the Launcher. An attacker could exploit this vulnerability by leveraging a man-in-the-middle position on the network to intercept the traffic between the Launcher and the ASDM and then inject arbitrary code. A successful exploit could allow the attacker to execute arbitrary code on the user's operating system with the level of privileges assigned to the ASDM Launcher. A successful exploit may require the attacker to perform a social engineering attack to persuade the user to initiate communication from the Launcher to the ASDM.

Una vulnerabilidad en el Iniciador de Cisco Adaptive Security Device Manager (ASDM), podría permitir a un atacante remoto no autenticado ejecutar código arbitrario en el sistema operativo de un usuario. Esta vulnerabilidad se presenta debido a la falta de verificación de firmas apropiada para el código específico intercambiado entre el ASDM y el Iniciador. Un atacante podría explotar esta vulnerabilidad al aprovechar una posición de tipo man-in-the-middle en la red para interceptar el tráfico entre el Iniciador y el ASDM y luego inyectar código arbitrario. Una explotación con éxito podría permitir al atacante ejecutar código arbitrario en el sistema operativo del usuario con el nivel de privilegios asignado al Iniciador ASDM. Una explotación con éxito puede requerir al atacante llevar a cabo un ataque de ingeniería social para persuadir al usuario de que inicie la comunicación desde el iniciador al ASDM

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-11-13 CVE Reserved
  • 2021-07-08 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • 2024-11-10 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Adaptive Security Device Manager
Search vendor "Cisco" for product "Adaptive Security Device Manager"
< 7.18.1.152
Search vendor "Cisco" for product "Adaptive Security Device Manager" and version " < 7.18.1.152"
-
Affected