Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-1584— Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability

CVSS 6.0 · Medium EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-1584

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Nexus 9000 Series Fabric Switches ACI Mode Privilege Escalation Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient restrictions during the execution of a specific CLI command. An attacker with administrative privileges could exploit this vulnerability by performing a command injection attack on the vulnerable command. A successful exploit could allow the attacker to access the underlying operating system as root.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Nexus 9000 Series Fabric Switches 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Nexus 9000 Series Fabric Switches是美国思科(Cisco)公司的一款9000系列光纤交换机。 Cisco Nexus 9000 Series Fabric Switches 存在安全漏洞,该漏洞源于CLI命令执行过程中限制不足造成的。攻击者可利用该漏洞以根用户身份访问底层操作系统。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco NX-OS System Software in ACI Mode n/a -

II. Public POCs for CVE-2021-1584

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-1584

登录查看更多情报信息。

Same Patch Batch · Cisco · 2021-08-25 · 15 CVEs total

CVE-2021-15779.1 CRITICALCisco Application Policy Infrastructure Controller Arbitrary File Read and Write Vulnerabi
CVE-2021-15788.8 HIGHCisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability
CVE-2021-15888.6 HIGHCisco NX-OS Software MPLS OAM Denial of Service Vulnerability
CVE-2021-15878.6 HIGHCisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability
CVE-2021-15868.6 HIGHCisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Se
CVE-2021-15238.6 HIGHCisco Nexus 9000 Series Fabric Switches ACI Mode Queue Wedge Denial of Service Vulnerabili
CVE-2021-15798.1 HIGHCisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability
CVE-2021-15816.5 MEDIUMCisco Application Policy Infrastructure Controller Command Injection and File Upload Vulne
CVE-2021-15806.5 MEDIUMCisco Application Policy Infrastructure Controller Command Injection and File Upload Vulne
CVE-2021-15915.8 MEDIUMCisco Nexus 9500 Series Switches Access Control List Bypass Vulnerability
CVE-2021-15825.4 MEDIUMCisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerabili
CVE-2021-15905.3 MEDIUMCisco NX-OS Software system login block-for Denial of Service Vulnerability
CVE-2021-15834.4 MEDIUMCisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability
CVE-2021-15924.3 MEDIUMCisco UCS Manager Software SSH Sessions Denial of Service Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2021-1584

No comments yet


Leave a comment