First published: Wed Mar 24 2021(Updated: )
A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device. This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Point Software | ||
Cisco Integrated Services Router | ||
Cisco Aironet 1540 Firmware | ||
Cisco Aironet 1560 | ||
Cisco Aironet 1800 Firmware | ||
Cisco Aironet 2800 | ||
Cisco Aironet 3800p | ||
Cisco Aironet 4800 Firmware | ||
Cisco Catalyst 9100 firmware | ||
Cisco Catalyst IW6300 AC Firmware | ||
Cisco ESW6300 Firmware | ||
Cisco Catalyst 9800-cl firmware | <16.12.5 | |
Cisco Catalyst 9800-cl firmware | >=17.1<=17.2 | |
Cisco Catalyst 9800 Firmware | ||
Cisco Wireless LAN Controller software 7.1 | <8.5.171.0 | |
Cisco Wireless LAN Controller software 7.1 | >=8.6<8.10.130.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1423 is a vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) that could allow an authenticated, local attacker to overwrite files in the device's flash memory.
CVE-2021-1423 has a severity value of 4.4 (medium).
Cisco Aironet Access Point Software and Cisco Wireless LAN Controller Software are affected by CVE-2021-1423.
An attacker can exploit CVE-2021-1423 by exploiting insufficient input validation for a specific command in the CLI of the affected Cisco devices.
You can find more information about CVE-2021-1423 in the Cisco Security Advisory at the following link: [Cisco Security Advisory](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-foverwrt-HyVXvrtb)