cisco wireless-lan-controller-software CVE-2021-1449 vulnerability in Cisco Products
Published on March 24, 2021

Cisco Access Point Software Arbitrary Code Execution Vulnerability
A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2021-1449 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2021-1449 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2021-1449

stack.watch emails you whenever new vulnerabilities are published in Cisco Wireless Lan Controller Software or Cisco Aironet Access Point Software. Just hit a watch button to start following.

 
 

Affected Versions

Cisco Aironet Access Point Software Version n/a is affected by CVE-2021-1449

Exploit Probability

EPSS
0.05%
Percentile
13.54%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.