CVE-2021-1375
Published Mar 24, 2021
Last updated 4 years ago
Overview
- Description
- Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" } ], "operator": "OR" } ] } ]