First published: Thu Jul 22 2021(Updated: )
Multiple vulnerabilities in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access sensitive internal services from an external interface. These vulnerabilities are due to insufficient restrictions for IPv4 or IPv6 packets that are received on the external management interface. An attacker could exploit these vulnerabilities by sending specific traffic to this interface on an affected device. A successful exploit could allow the attacker to access sensitive internal services and make configuration changes on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Intersight Virtual Appliance | =1.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1600.
The severity of CVE-2021-1600 is high with a severity value of 8.3.
The Cisco Intersight Virtual Appliance version 1.0(1) is affected by CVE-2021-1600.
An unauthenticated attacker can exploit CVE-2021-1600 by accessing sensitive internal services from an external interface.
To fix CVE-2021-1600, apply the necessary patches or updates provided by Cisco.