First published: Thu May 06 2021(Updated: )
A vulnerability in Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to gain access to sensitive information on an affected device. The vulnerability is due to improper input validation and authorization of specific commands that a user can execute within the CLI. An attacker could exploit this vulnerability by authenticating to an affected device and issuing a specific set of commands. A successful exploit could allow the attacker to read arbitrary files that they originally did not have permissions to access.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services | <=6.4.5a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1438 has a medium severity rating due to its potential to allow sensitive information disclosure.
CVE-2021-1438 affects users of Cisco Wide Area Application Services versions up to 6.4.5a.
To fix CVE-2021-1438, it is recommended to upgrade to a patched version of Cisco Wide Area Application Services.
CVE-2021-1438 can be exploited by an authenticated, local attacker.
CVE-2021-1438 is caused by improper input validation and authorization of specific commands in Cisco WAAS.