First published: Thu Sep 23 2021(Updated: )
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 1542D | ||
Cisco Aironet 1542D | ||
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1830E Firmware | ||
Cisco Aironet 1830E Firmware | ||
Cisco Aironet 1840i Firmware | ||
Cisco Aironet 1840i Firmware | ||
Cisco Aironet 1850E Firmware | ||
Cisco Aironet 1850e Access Point | ||
Cisco Aironet 2800 Firmware | ||
Cisco Aironet 2800 Firmware | ||
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800P Firmware | ||
Cisco Aironet 4800 Firmware | ||
Cisco Aironet 4800 Firmware | ||
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9115 AP Firmware | ||
Cisco Catalyst 9115 AP Firmware | ||
Cisco Catalyst 9117 Firmware | ||
Cisco Catalyst 9117AX | ||
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst IW6300 AC Firmware | ||
Cisco Catalyst IW6300 | ||
Cisco ESW-6300-CON-X-K9 Firmware | ||
Cisco ESW6300 Firmware | ||
Cisco 1100 Firmware | ||
Cisco 1100 Series Integrated Services Router | ||
Cisco 1120 Firmware | ||
Cisco 1120 Firmware | ||
Cisco 1160 Firmware | ||
Cisco 1160 Integrated Services Router | ||
Cisco Wireless LAN Controller (WLC) Software | >=8.10<8.10.151.0 | |
Cisco Catalyst 9800-cl firmware | >=16.12<16.12.6 | |
Cisco Catalyst 9800-cl firmware | >=17.3<17.3.3 | |
Cisco Catalyst 9800-cl firmware | =17.4 | |
Cisco Catalyst 9800-L | ||
Cisco Aironet 1542i Firmware | ||
Cisco Aironet 1542i Firmware | ||
Cisco Catalyst 9800-CL | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Aironet 1562E | ||
Cisco Aironet 1562E Firmware | ||
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1830i Firmware | ||
Cisco Aironet 1830i Access Point | ||
Cisco Aironet 1850i Firmware | ||
Cisco Aironet 1850i Access Point | ||
Cisco Aironet 2800e Firmware | ||
Cisco Aironet 2800e Firmware | ||
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800E Firmware | ||
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9105AX | ||
Cisco Catalyst 9115AXI | ||
Cisco Catalyst 9115AXI Firmware | ||
Cisco Catalyst 9120 Access Point Firmware | ||
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9120 Access Point Firmware | ||
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst IW6300 DC Firmware | ||
Cisco Catalyst IW6300 | ||
Cisco Catalyst IW6300 DCW Firmware | ||
Cisco Catalyst IW6300 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-ap-LLjsGxv
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1419 is classified as a high severity vulnerability.
To mitigate CVE-2021-1419, it is recommended to update affected Cisco Access Points to the latest firmware version.
The affected devices include various Cisco Access Points like Aironet 1542D, 1562, 1815M, and others.
CVE-2021-1419 allows a local, authenticated user to modify files on the device and potentially escalate their privileges.
No, CVE-2021-1419 is a local vulnerability and requires authentication to exploit.