First published: Wed Mar 24 2021(Updated: )
A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(6\)i1 | |
Cisco IOS | =15.0\(2\)se13a | |
Cisco IOS | =15.1\(3\)svr1 | |
Cisco IOS | =15.1\(3\)svr2 | |
Cisco IOS | =15.1\(3\)svr3 | |
Cisco IOS | =15.1\(3\)svs | |
Cisco IOS | =15.1\(3\)svs1 | |
Cisco IOS | =15.2\(4\)ea10 | |
Cisco IOS | =15.2\(5\)e | |
Cisco IOS | =15.2\(5\)e1 | |
Cisco IOS | =15.2\(5\)e2 | |
Cisco IOS | =15.2\(5\)e2b | |
Cisco IOS | =15.2\(5\)e2c | |
Cisco IOS | =15.2\(5\)ea | |
Cisco IOS | =15.2\(5\)ex | |
Cisco IOS | =15.2\(5a\)e | |
Cisco IOS | =15.2\(5a\)e1 | |
Cisco IOS | =15.2\(5b\)e | |
Cisco IOS | =15.2\(5c\)e | |
Cisco IOS | =15.2\(6\)e | |
Cisco IOS | =15.2\(6\)e0a | |
Cisco IOS | =15.2\(6\)e0c | |
Cisco IOS | =15.2\(6\)e1 | |
Cisco IOS | =15.2\(6\)e1a | |
Cisco IOS | =15.2\(6\)e1s | |
Cisco IOS | =15.2\(6\)e2 | |
Cisco IOS | =15.2\(6\)e2a | |
Cisco IOS | =15.2\(6\)e2b | |
Cisco IOS | =15.2\(6\)e3 | |
Cisco IOS | =15.2\(6\)eb | |
Cisco IOS | =15.2\(7\)e | |
Cisco IOS | =15.2\(7\)e0a | |
Cisco IOS | =15.2\(7\)e0b | |
Cisco IOS | =15.2\(7\)e0s | |
Cisco IOS | =15.2\(7\)e1 | |
Cisco IOS | =15.2\(7\)e1a | |
Cisco IOS | =15.2\(7\)e2 | |
Cisco IOS | =15.2\(7\)e2a | |
Cisco IOS | =15.2\(7\)e2b | |
Cisco IOS | =15.2\(7\)e3 | |
Cisco IOS | =15.2\(7\)e3k | |
Cisco IOS | =15.2\(7a\)e0b | |
Cisco IOS | =15.2\(7b\)e0b | |
Cisco IOS | =15.3\(3\)jf13 | |
Cisco IOS XE Software | =3.9.0e | |
Cisco IOS XE Software | =3.9.1e | |
Cisco IOS XE Software | =3.9.2be | |
Cisco IOS XE Software | =3.9.2e | |
Cisco IOS XE Software | =3.10.0ce | |
Cisco IOS XE Software | =3.10.0e | |
Cisco IOS XE Software | =3.10.1ae | |
Cisco IOS XE Software | =3.10.1e | |
Cisco IOS XE Software | =3.10.1se | |
Cisco IOS XE Software | =3.10.2e | |
Cisco IOS XE Software | =3.10.3e | |
Cisco IOS XE Software | =3.11.0e | |
Cisco IOS XE Software | =3.11.1ae | |
Cisco IOS XE Software | =3.11.1e | |
Cisco IOS XE Software | =3.11.2ae | |
Cisco IOS XE Software | =3.11.2e | |
Cisco IOS XE Software | =3.11.3ae | |
Cisco IOS XE Software | =3.11.3e | |
Cisco IOS XE Software | =16.8.1 | |
Cisco IOS XE Software | =16.8.1a | |
Cisco IOS XE Software | =16.8.1b | |
Cisco IOS XE Software | =16.8.1c | |
Cisco IOS XE Software | =16.8.1d | |
Cisco IOS XE Software | =16.8.1e | |
Cisco IOS XE Software | =16.8.1s | |
Cisco IOS XE Software | =16.8.2 | |
Cisco IOS XE Software | =16.8.3 | |
Cisco IOS XE Software | =16.9.1 | |
Cisco IOS XE Software | =16.9.1a | |
Cisco IOS XE Software | =16.9.1b | |
Cisco IOS XE Software | =16.9.1c | |
Cisco IOS XE Software | =16.9.1d | |
Cisco IOS XE Software | =16.9.1s | |
Cisco IOS XE Software | =16.9.2 | |
Cisco IOS XE Software | =16.9.2a | |
Cisco IOS XE Software | =16.9.2s | |
Cisco IOS XE Software | =16.9.3 | |
Cisco IOS XE Software | =16.9.3a | |
Cisco IOS XE Software | =16.9.3h | |
Cisco IOS XE Software | =16.9.3s | |
Cisco IOS XE Software | =16.9.4 | |
Cisco IOS XE Software | =16.9.4c | |
Cisco IOS XE Software | =16.9.5 | |
Cisco IOS XE Software | =16.9.5f | |
Cisco IOS XE Software | =16.9.6 | |
Cisco IOS XE Software | =16.10.1 | |
Cisco IOS XE Software | =16.10.1a | |
Cisco IOS XE Software | =16.10.1b | |
Cisco IOS XE Software | =16.10.1c | |
Cisco IOS XE Software | =16.10.1d | |
Cisco IOS XE Software | =16.10.1e | |
Cisco IOS XE Software | =16.10.1f | |
Cisco IOS XE Software | =16.10.1g | |
Cisco IOS XE Software | =16.10.1s | |
Cisco IOS XE Software | =16.10.2 | |
Cisco IOS XE Software | =16.10.3 | |
Cisco IOS XE Software | =16.11.1 | |
Cisco IOS XE Software | =16.11.1a | |
Cisco IOS XE Software | =16.11.1b | |
Cisco IOS XE Software | =16.11.1c | |
Cisco IOS XE Software | =16.11.1s | |
Cisco IOS XE Software | =16.11.2 | |
Cisco IOS XE Software | =16.12.1 | |
Cisco IOS XE Software | =16.12.1a | |
Cisco IOS XE Software | =16.12.1c | |
Cisco IOS XE Software | =16.12.1s | |
Cisco IOS XE Software | =16.12.1t | |
Cisco IOS XE Software | =16.12.1w | |
Cisco IOS XE Software | =16.12.1x | |
Cisco IOS XE Software | =16.12.1y | |
Cisco IOS XE Software | =16.12.1z | |
Cisco IOS XE Software | =16.12.1za | |
Cisco IOS XE Software | =16.12.2 | |
Cisco IOS XE Software | =16.12.2a | |
Cisco IOS XE Software | =16.12.2s | |
Cisco IOS XE Software | =16.12.2t | |
Cisco IOS XE Software | =16.12.3 | |
Cisco IOS XE Software | =16.12.3a | |
Cisco IOS XE Software | =16.12.3s | |
Cisco IOS XE Software | =17.1.1 | |
Cisco IOS XE Software | =17.1.1a | |
Cisco IOS XE Software | =17.1.1s | |
Cisco IOS XE Software | =17.1.1t | |
Cisco IOS XE Software | =17.1.2 | |
Cisco IOS XE Software | =17.2.1 | |
Cisco IOS XE Software | =17.2.1a | |
Cisco IOS XE Software | =17.2.1r | |
Cisco IOS XE Software | =17.2.1v | |
Cisco IOS XE Software | =17.2.2 | |
Cisco IOS XE Software | =17.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1391 has been assigned a high CVSS score indicating significant potential impact.
To fix CVE-2021-1391, upgrade to a fixed version of Cisco IOS XE software as recommended by Cisco.
CVE-2021-1391 affects authenticated users with local access to Cisco IOS XE devices running specific versions.
CVE-2021-1391 allows attackers to escalate privileges from level 15 to root, potentially compromising the device.
CVE-2021-1391 is not exploitable remotely as it requires authenticated local access to the affected device.