First published: Thu Jul 08 2021(Updated: )
Multiple vulnerabilities in the web-based management interface of Cisco Business Process Automation (BPA) could allow an authenticated, remote attacker to elevate privileges to Administrator. These vulnerabilities are due to improper authorization enforcement for specific features and for access to log files that contain confidential information. An attacker could exploit these vulnerabilities either by submitting crafted HTTP messages to an affected system and performing unauthorized actions with the privileges of an administrator, or by retrieving sensitive data from the logs and using it to impersonate a legitimate privileged user. A successful exploit could allow the attacker to elevate privileges to Administrator.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Business Process Automation | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1574 is a vulnerability in the web-based management interface of Cisco Business Process Automation (BPA) that could allow an authenticated, remote attacker to elevate privileges to Administrator.
CVE-2021-1574 has a severity rating of 8.8, which is classified as critical.
The affected software for CVE-2021-1574 is Cisco Business Process Automation up to version 3.1.
CVE-2021-1574 is associated with CWE-798 and CWE-285.
To fix CVE-2021-1574, Cisco recommends upgrading to a fixed software release.