First published: Thu May 06 2021(Updated: )
A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Content Security Management Appliance | <12.8.1-002 | |
Cisco Content Security Management Appliance | >=13.0.0-249<13.8.1-068 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-1447 is high.
CVE-2021-1447 affects Cisco AsyncOS for Cisco Content Security Management Appliance versions 12.8.1-002 and between 13.0.0-249 and 13.8.1-068.
The vulnerability in CVE-2021-1447 is a procedural flaw in the password generation algorithm of Cisco AsyncOS for Cisco Content Security Management Appliance.
An authenticated, local attacker can exploit CVE-2021-1447 to elevate their privileges to root.
Yes, Cisco has released a security advisory with mitigation details for CVE-2021-1447. Please refer to the advisory for more information.