CVE-2021-1572

Severity
7.8HIGH
EPSS
0.1%
top 70.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4
Latest updateMay 24

Description

A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which ConfD is running, which is commonly root. To exploit this vulnerability, an attacker must have a valid account on an affected device. The vulnerability exists because the affected software incorrectly runs the SFTP user service at the privilege level of the account that was running when the ConfD built-in Secure Shell (SSH) server for CLI was enabled. If the

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDcisco/confd7.47.4.3+1
CVEListV5cisco/cisco_confdn/a

🔴Vulnerability Details

2
GHSA
GHSA-jjcm-mvqj-g3mq: A vulnerability in ConfD could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which ConfD is r2022-05-24
CVEList
ConfD CLI Secure Shell Server Privilege Escalation Vulnerability2021-08-04

📋Vendor Advisories

2
Cisco
ConfD CLI Secure Shell Server Privilege Escalation Vulnerability2021-08-04
Cisco
Cisco Network Services Orchestrator CLI Secure Shell Server Privilege Escalation Vulnerability2021-08-04
CVE-2021-1572 (HIGH CVSS 7.8) | A vulnerability in ConfD could allo | cvebase.io