First published: Wed Mar 24 2021(Updated: )
A vulnerability in Cisco IOx application hosting environment of Cisco IOS XE Software could allow an authenticated, remote attacker to inject commands into the underlying operating system as the root user. This vulnerability is due to incomplete validation of fields in the application packages loaded onto IOx. An attacker could exploit this vulnerability by creating a crafted application .tar file and loading it onto the device. A successful exploit could allow the attacker to perform command injection into the underlying operating system as the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | <16.6.9 | |
Cisco IOS XE Web UI | >=16.9.0<16.9.7 | |
Cisco IOS XE Web UI | >=17.3.2<17.3.3 | |
Cisco IOS XE Web UI | >=17.4.0<17.4.2 | |
Cisco IOS XE Web UI | =17.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1384 is rated as a high severity vulnerability due to its potential to allow command injection at the operating system level.
To remediate CVE-2021-1384, upgrade affected Cisco IOS XE software to a version that does not contain the vulnerability.
CVE-2021-1384 affects authenticated users of Cisco IOS XE versions prior to the fixed releases mentioned in Cisco's security advisory.
CVE-2021-1384 allows authenticated, remote attackers to execute arbitrary commands on the underlying operating system as the root user.
The incomplete validation in CVE-2021-1384 refers to the inability of Cisco IOx to adequately check user input, enabling command injection vulnerabilities.