First published: Wed Mar 24 2021(Updated: )
Cisco IOS XE contains a command injection vulnerability in the web user interface that could allow a remote, authenticated attacker to inject commands that can be executed as the root user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Cisco IOS XE Web UI | ||
Cisco IOS XE | =16.9.1 | |
Cisco IOS XE | =16.9.1a | |
Cisco IOS XE | =16.9.1b | |
Cisco IOS XE | =16.9.1c | |
Cisco IOS XE | =16.9.1d | |
Cisco IOS XE | =16.9.1s | |
Cisco IOS XE | =16.9.2 | |
Cisco IOS XE | =16.9.2a | |
Cisco IOS XE | =16.9.2s | |
Cisco IOS XE | =16.9.3 | |
Cisco IOS XE | =16.9.3a | |
Cisco IOS XE | =16.9.3h | |
Cisco IOS XE | =16.9.3s | |
Cisco IOS XE | =16.9.4 | |
Cisco IOS XE | =16.9.4c | |
Cisco IOS XE | =16.9.5 | |
Cisco IOS XE | =16.9.5f | |
Cisco IOS XE | =16.9.6 | |
Cisco IOS XE | =16.10.1 | |
Cisco IOS XE | =16.10.1a | |
Cisco IOS XE | =16.10.1b | |
Cisco IOS XE | =16.10.1c | |
Cisco IOS XE | =16.10.1d | |
Cisco IOS XE | =16.10.1e | |
Cisco IOS XE | =16.10.1f | |
Cisco IOS XE | =16.10.1g | |
Cisco IOS XE | =16.10.1s | |
Cisco IOS XE | =16.10.2 | |
Cisco IOS XE | =16.10.3 | |
Cisco IOS XE | =16.11.1 | |
Cisco IOS XE | =16.11.1a | |
Cisco IOS XE | =16.11.1b | |
Cisco IOS XE | =16.11.1c | |
Cisco IOS XE | =16.11.1s | |
Cisco IOS XE | =16.11.2 | |
Cisco IOS XE | =17.2.1v |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1435 is a vulnerability in the web UI of Cisco IOS XE Software that allows an authenticated, remote attacker to inject arbitrary commands as the root user.
CVE-2021-1435 has a severity rating of 7.2, which is considered critical.
Cisco IOS XE Web UI is affected by CVE-2021-1435.
An attacker can exploit CVE-2021-1435 by sending a crafted request to the web UI.
Yes, you can find more information about CVE-2021-1435 at the following references: [Link 1](https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/), [Link 2](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webcmdinjsh-UFJxTgZD)