First published: Thu Sep 09 2021(Updated: )
Multiple vulnerabilities in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker with a low-privileged account to elevate privileges on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | <7.3.2 | |
Cisco IOS XR | >=7.4.0<7.4.1 | |
Cisco Asr 9000v-v2 | ||
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9901 | ||
Cisco Asr 9902 | ||
Cisco Asr 9903 | ||
Cisco Asr 9904 | ||
Cisco Asr 9906 | ||
Cisco Asr 9910 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 | ||
Cisco Ios Xrv | ||
Cisco Ios Xrv 9000 | ||
Cisco Ncs 520 | ||
Cisco Ncs 540 | ||
Cisco Ncs 540 Fronthaul | ||
Cisco Ncs 560-4 | ||
Cisco Ncs 560-7 | ||
Cisco Ncs 5001 | ||
Cisco Ncs 5002 | ||
Cisco Ncs 5011 | ||
Cisco Ncs 4009 | ||
Cisco Ncs 4016 | ||
Cisco Ncs 5501 | ||
Cisco Ncs 5501-se | ||
Cisco Ncs 5502 | ||
Cisco Ncs 5502-se | ||
Cisco Ncs 5508 | ||
Cisco Ncs 5516 | ||
Cisco Ncs 6000 | ||
Cisco Ncs 6008 | ||
Cisco Ncs 1001 | ||
Cisco Ncs 1002 | ||
Cisco Ncs 1004 | ||
Cisco 8101-32fh | ||
Cisco 8101-32h | ||
Cisco 8102-64h | ||
Cisco 8201 | ||
Cisco 8201-32fh | ||
Cisco 8202 | ||
Cisco 8804 | ||
Cisco 8808 | ||
Cisco 8812 | ||
Cisco 8818 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34728 is a vulnerability in the CLI of Cisco IOS XR Software that could allow an authenticated, local attacker to elevate privileges on an affected device.
The severity of CVE-2021-34728 is high with a CVSS score of 7.8.
An attacker with a low-privileged account can exploit CVE-2021-34728 by leveraging vulnerabilities in the CLI of Cisco IOS XR Software to elevate privileges on the targeted device.
Cisco IOS XR Software versions up to and including 7.3.2 and versions 7.4.0 to 7.4.1 are affected by CVE-2021-34728.
To mitigate the CVE-2021-34728 vulnerability, Cisco recommends upgrading to a fixed software release.