First published: Wed Mar 24 2021(Updated: )
A vulnerability in the Cisco IOx application hosting environment of multiple Cisco platforms could allow an authenticated, remote attacker to conduct directory traversal attacks and read and write files on the underlying operating system or host system. This vulnerability occurs because the device does not properly validate URIs in IOx API requests. An attacker could exploit this vulnerability by sending a crafted API request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to read or write arbitrary files on the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.8\(3\)m2a | |
Cisco IOS | =15.8\(3\)m3 | |
Cisco IOS | =15.8\(3\)m4 | |
Cisco IOS | =15.8\(3\)m5 | |
Cisco IOS | =15.8\(3\)m6 | |
Cisco IOS | =15.9\(3\)m | |
Cisco IOS | =15.9\(3\)m1 | |
Cisco IOS | =15.9\(3\)m2 | |
Cisco IOS | =15.9\(3\)m2a | |
Cisco IOS | =15.9\(3\)m3 | |
Cisco IOS XE | =16.11.1 | |
Cisco IOS XE | =16.11.1a | |
Cisco IOS XE | =16.11.1b | |
Cisco IOS XE | =16.11.1c | |
Cisco IOS XE | =16.11.1s | |
Cisco IOS XE | =16.11.2 | |
Cisco IOS XE | =16.12.1 | |
Cisco IOS XE | =16.12.1a | |
Cisco IOS XE | =16.12.1c | |
Cisco IOS XE | =16.12.1s | |
Cisco IOS XE | =16.12.1t | |
Cisco IOS XE | =16.12.1w | |
Cisco IOS XE | =16.12.1x | |
Cisco IOS XE | =16.12.1y | |
Cisco IOS XE | =16.12.1z | |
Cisco IOS XE | =16.12.1z1 | |
Cisco IOS XE | =16.12.1za | |
Cisco IOS XE | =16.12.2 | |
Cisco IOS XE | =16.12.2a | |
Cisco IOS XE | =16.12.2s | |
Cisco IOS XE | =16.12.2t | |
Cisco IOS XE | =16.12.3 | |
Cisco IOS XE | =16.12.3a | |
Cisco IOS XE | =16.12.3s | |
Cisco IOS XE | =16.12.4 | |
Cisco IOS XE | =16.12.4a | |
Cisco IOS XE | =16.12.5 | |
Cisco IOS XE | =17.1.1 | |
Cisco IOS XE | =17.1.1a | |
Cisco IOS XE | =17.1.1s | |
Cisco IOS XE | =17.1.1t | |
Cisco IOS XE | =17.1.2 | |
Cisco IOS XE | =17.1.3 | |
Cisco IOS XE | =17.2.1 | |
Cisco IOS XE | =17.2.1a | |
Cisco IOS XE | =17.2.1r | |
Cisco IOS XE | =17.2.1v | |
Cisco IOS XE | =17.2.2 | |
Cisco IOS XE | =17.3.1 | |
Cisco IOS XE | =17.3.1a | |
Cisco IOS XE | =17.3.1w | |
Cisco IOS XE | =17.3.1x | |
Cisco IOS XE | =17.3.2 | |
Cisco IOS XE | =17.3.2a | |
Cisco IOS XE | =17.4.1 | |
Cisco IOS XE | =17.4.1a | |
Cisco IOS XE | =17.4.1b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1385 has a CVSS score of 7.6, indicating it is of significant severity.
To fix CVE-2021-1385, update to the recommended patched versions of Cisco IOS or IOS XE as specified in Cisco's security advisory.
CVE-2021-1385 affects multiple versions of Cisco IOS and IOS XE across various Cisco platforms that use the IOx application hosting environment.
CVE-2021-1385 allows authenticated remote attackers to conduct directory traversal attacks, potentially accessing or modifying files on the host system.
To exploit CVE-2021-1385, an attacker must be authenticated to the device and have the ability to send specially crafted requests.