CVE编号
CVE-2021-34724利用情况
暂无补丁情况
N/A披露时间
2021-09-23漏洞描述
A vulnerability in the Cisco IOS XE SD-WAN Software CLI could allow an authenticated, local attacker to elevate privileges and execute arbitrary code on the underlying operating system as the root user. An attacker must be authenticated on an affected device as a PRIV15 user. This vulnerability is due to insufficient file system protection and the presence of a sensitive file in the bootflash directory on an affected device. An attacker could exploit this vulnerability by overwriting an installer file stored in the bootflash directory with arbitrary commands that can be executed with root-level privileges. A successful exploit could allow the attacker to read and write changes to the configuration database on the affected device.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | cisco | ios_xe_sd-wan | * |
Up to (including) 17.3.1a |
|||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000-esp100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000_series | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000_series_route_processor_(rp2) | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1000_series_route_processor_(rp3) | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1001 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1001-hx | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1001-hx_r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1001-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1001-x_r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1002 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1002-hx | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1002-hx_r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1002-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1002-x_r | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1004 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1006 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1006-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1009-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1013 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | asr_1023 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | csr_1000v | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1100-4g/6g | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1100-4p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1100-8p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1101 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1101-4p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1109 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1109-2p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1109-4p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1111x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1111x-8p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_111x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1120 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_1160 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_422 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4221 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4321 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4331 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4351 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4431 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4451 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4451-x | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | isr_4461 | - | - |
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 高
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...