CVE-2021-1449 vulnerability in Cisco Products
Published on March 24, 2021
Cisco Access Point Software Arbitrary Code Execution Vulnerability
A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.
Vulnerability Analysis
CVE-2021-1449 can be exploited with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2021-1449 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2021-1449
stack.watch emails you whenever new vulnerabilities are published in Cisco Wireless Lan Controller Software or Cisco Aironet Access Point Software. Just hit a watch button to start following.
Affected Versions
Cisco Aironet Access Point Software Version n/a is affected by CVE-2021-1449Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.