Cisco SD-WAN vManage Auth Command Injection DoS
CVE-2021-1484 Published on November 15, 2024
Cisco SD-WAN vManage Command Injection Vulnerability
A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition.
This vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerability Analysis
CVE-2021-1484 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Weakness Type
What is an Argument Injection Vulnerability?
The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
CVE-2021-1484 has been classified to as an Argument Injection vulnerability or weakness.
Products Associated with CVE-2021-1484
Want to know whenever a new CVE is published for Cisco Catalyst Sd Wan Manager? stack.watch will email you.
Affected Versions
Cisco Catalyst SD-WAN Manager:- Version 20.1.12 is affected.
- Version 19.2.1 is affected.
- Version 18.4.4 is affected.
- Version 18.4.5 is affected.
- Version 20.1.1.1 is affected.
- Version 20.1.1 is affected.
- Version 19.3.0 is affected.
- Version 19.2.2 is affected.
- Version 19.2.099 is affected.
- Version 18.3.6 is affected.
- Version 18.3.7 is affected.
- Version 19.2.0 is affected.
- Version 18.3.8 is affected.
- Version 19.0.0 is affected.
- Version 19.1.0 is affected.
- Version 18.4.302 is affected.
- Version 18.4.303 is affected.
- Version 19.2.097 is affected.
- Version 19.2.098 is affected.
- Version 17.2.10 is affected.
- Version 18.3.6.1 is affected.
- Version 19.0.1a is affected.
- Version 18.2.0 is affected.
- Version 18.4.3 is affected.
- Version 18.4.1 is affected.
- Version 17.2.8 is affected.
- Version 18.3.3.1 is affected.
- Version 18.4.0 is affected.
- Version 18.3.1 is affected.
- Version 17.2.6 is affected.
- Version 17.2.9 is affected.
- Version 18.3.4 is affected.
- Version 17.2.5 is affected.
- Version 18.3.1.1 is affected.
- Version 18.3.5 is affected.
- Version 18.4.0.1 is affected.
- Version 18.3.3 is affected.
- Version 17.2.7 is affected.
- Version 17.2.4 is affected.
- Version 18.3.0 is affected.
- Version 19.2.3 is affected.
- Version 18.4.501_ES is affected.
- Version 20.3.1 is affected.
- Version 20.1.2 is affected.
- Version 19.2.929 is affected.
- Version 19.2.31 is affected.
- Version 20.3.2 is affected.
- Version 20.3.2.1 is affected.
- Version 20.3.2.1_927 is affected.
- Version 20.4.1 is affected.
- Version 20.3.2_928 is affected.
- Version 20.3.2_929 is affected.
- Version 20.4.1.0.1 is affected.
- Version 20.3.2.1_930 is affected.
- Version 19.2.4 is affected.
- Version 20.4.1.1 is affected.
- Version 20.3.3 is affected.
- Version 19.2.4.0.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.