First published: Wed Mar 24 2021(Updated: )
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Point Software | ||
Cisco 1100 Integrated Services Router | ||
Cisco Aironet 1540 | ||
Cisco Aironet 1560 | ||
Cisco Aironet 1800 | ||
Cisco Aironet 2800 | ||
Cisco Aironet 3800 | ||
Cisco Aironet 4800 | ||
Cisco Catalyst 9100 | ||
Cisco Catalyst Iw6300 | ||
Cisco Esw6300 | ||
Cisco Catalyst 9800 Firmware | >=17.1<17.3.3 | |
Cisco Catalyst 9800 Series Routers | ||
Cisco Wireless LAN Controller Software | >=8.10.112.0<8.10.142.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1437.
The severity of CVE-2021-1437 is high with a CVSS score of 7.5.
Cisco Aironet Series Access Points Software is affected by CVE-2021-1437.
CVE-2021-1437 allows an unauthenticated, remote attacker to obtain confidential information from the affected device.
Yes, Cisco has released a software update to address the vulnerability.