CVE-2021-1421 is a vulnerability in Cisco Enterprise Nfv Infrastructure Software
Published on May 6, 2021
Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability
A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to perform a command injection attack on an affected device. The vulnerability is due to insufficient validation of user-supplied input to a configuration command. An attacker could exploit this vulnerability by including malicious input during the execution of this command. A successful exploit could allow a non-privileged attacker authenticated in the restricted CLI to execute arbitrary commands on the underlying operating system (OS) with root privileges.
Vulnerability Analysis
CVE-2021-1421 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is a Shell injection Vulnerability?
The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
CVE-2021-1421 has been classified to as a Shell injection vulnerability or weakness.
Products Associated with CVE-2021-1421
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-1421 are published in Cisco Enterprise Nfv Infrastructure Software:
Affected Versions
Cisco Enterprise NFV Infrastructure Software Version n/a is affected by CVE-2021-1421Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.