{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2021-023.pdf"
    },
    "title": "Critical Vulnerabilities in Cisco Products",
    "serial_number": "2021-023",
    "publish_date": "06-05-2021 09:29:00",
    "description": "On 5th of March 2021, Cisco released several security updates to address several security flaws. The list includes two critical vulnerabilities affecting Cisco SD-WAN vManage and HyperFlex HX software that could allow privilege escalation, command injection or unauthorised access to applications.",
    "url_title": "2021-023",
    "content_markdown": "---\ntitle: 'Critical Vulnerabilities in\u00a0Cisco\u00a0Products'\nversion: '1.0'\nnumber: '2021-023'\ndate: 'May 6, 2021'\n---\n\n# Summary\n\nOn 5th of March 2021, Cisco released several security updates to address several security flaws [1]. The list includes two critical vulnerabilities affecting Cisco SD-WAN vManage and HyperFlex HX software that could allow privilege escalation, command injection or unauthorised access to applications.\n\n# Technical Details\n\n## Critical Vulnerabilities\n\n### CVE-2021-1275, CVE-2021-1468, CVE-2021-1505\n\nMultiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorised access to the application [2].\n\n### CVE-2021-1497, CVE-2021-1498\n\nMultiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device [3].\n\n## Other Vulnerabilities\n\nAdditionally to the critical vulnerabilities mentioned above Cisco announced several others, most notably:\n\n- Cisco SD-WAN Software vDaemon Denial of Service Vulnerability - SIR: High\n- Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities - SIR: High\n- Cisco SD-WAN vManage Software Authentication Bypass Vulnerability - SIR: High\n- Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities - SIR: High\n- Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability - SIR: High\n- Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities - SIR: High\n- Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerabilities - SIR: High\n\n# Products Affected\n\nThe critical vulnerabilities affect Cisco devices if they are running a vulnerable release of Cisco SD-WAN vManage Software or a vulnerable release of Cisco HyperFlex HX Software mentioned in [3].\n\n# Recommendations\n\nCisco has released software updates that address these critical vulnerabilities [1, 2, 3].\n\nThere are no workarounds that address the critical vulnerabilities.\n\nCERT-EU recommends updating the vulnerable application as soon as possible.\n\n\n# References\n\n[1] <https://tools.cisco.com/security/center/publicationListing.x>\n\n[2] <https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ>\n\n[3] <https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR>\n",
    "content_html": "<h2 id=\"summary\">Summary</h2><p>On 5th of March 2021, Cisco released several security updates to address several security flaws [1]. The list includes two critical vulnerabilities affecting Cisco SD-WAN vManage and HyperFlex HX software that could allow privilege escalation, command injection or unauthorised access to applications.</p><h2 id=\"technical-details\">Technical Details</h2><h3 id=\"critical-vulnerabilities\">Critical Vulnerabilities</h3><h4 id=\"cve-2021-1275-cve-2021-1468-cve-2021-1505\">CVE-2021-1275, CVE-2021-1468, CVE-2021-1505</h4><p>Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorised access to the application [2].</p><h4 id=\"cve-2021-1497-cve-2021-1498\">CVE-2021-1497, CVE-2021-1498</h4><p>Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device [3].</p><h3 id=\"other-vulnerabilities\">Other Vulnerabilities</h3><p>Additionally to the critical vulnerabilities mentioned above Cisco announced several others, most notably:</p><ul><li>Cisco SD-WAN Software vDaemon Denial of Service Vulnerability - SIR: High</li><li>Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities - SIR: High</li><li>Cisco SD-WAN vManage Software Authentication Bypass Vulnerability - SIR: High</li><li>Cisco AnyConnect Secure Mobility Client for Windows DLL and Executable Hijacking Vulnerabilities - SIR: High</li><li>Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability - SIR: High</li><li>Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities - SIR: High</li><li>Cisco Unified Communications Manager IM &amp; Presence Service SQL Injection Vulnerabilities - SIR: High</li></ul><h2 id=\"products-affected\">Products Affected</h2><p>The critical vulnerabilities affect Cisco devices if they are running a vulnerable release of Cisco SD-WAN vManage Software or a vulnerable release of Cisco HyperFlex HX Software mentioned in [3].</p><h2 id=\"recommendations\">Recommendations</h2><p>Cisco has released software updates that address these critical vulnerabilities [1, 2, 3].</p><p>There are no workarounds that address the critical vulnerabilities.</p><p>CERT-EU recommends updating the vulnerable application as soon as possible.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://tools.cisco.com/security/center/publicationListing.x\">https://tools.cisco.com/security/center/publicationListing.x</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-vmanage-4TbynnhZ</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR\">https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-rce-TjjNrkpR</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}