CVE-2021-1129
Published Jan 20, 2021
Last updated a year ago
Overview
- Description
- A vulnerability in the authentication for the general purpose APIs implementation of Cisco Email Security Appliance (ESA), Cisco Content Security Management Appliance (SMA), and Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to access general system information and certain configuration information from an affected device. The vulnerability exists because a secure authentication token is not required when authenticating to the general purpose API. An attacker could exploit this vulnerability by sending a crafted request for information to the general purpose API on an affected device. A successful exploit could allow the attacker to obtain system and configuration information from the affected device, resulting in an unauthorized information disclosure.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- ykramarz@cisco.com
- CWE-201
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:content_security_management_appliance:12.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABA69641-8EAA-4398-8318-CE2140B78FE2" }, { "criteria": "cpe:2.3:a:cisco:email_security_appliance:13.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CE7D34C-83CD-4044-8F1F-8486A3CB155D" }, { "criteria": "cpe:2.3:a:cisco:web_security_appliance:11.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A765083-C718-454F-846C-5EF42E94E446" } ], "operator": "OR" } ] } ]