CVE-2021-1437
Published Mar 24, 2021
Last updated a year ago
Overview
- Description
- A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP).
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- ykramarz@cisco.com
- CWE-275
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D48036EE-DE42-412A-B3C9-CBCE7414DB33" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822" }, { "criteria": "cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "72BFEED4-7AD7-406F-A044-BDEA98133711" }, { "criteria": "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8191FD87-4E55-4F38-8DB0-7E6772AD075B" }, { "criteria": "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "02F4C00A-D1E2-4B21-A14E-F30B4B818493" }, { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E" }, { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4" }, { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215" }, { "criteria": "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "749040C6-A21A-4EF3-8213-42EE01CFA303" }, { "criteria": "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C559D6F7-B432-4A2A-BE0E-9697CC412C70" }, { "criteria": "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "09051BC5-CFE7-43EF-975D-BF77724E8776" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BDFBA81-4DF6-4BC8-8D16-2520510ADE2E", "versionEndExcluding": "17.3.3", "versionStartIncluding": "17.1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "168B2B18-BFBB-4AE9-BAE5-E178BA2DA844", "versionEndExcluding": "8.10.142.0", "versionStartIncluding": "8.10.112.0" } ], "operator": "OR" } ] } ]