ID

VAR-202103-1626


CVE

CVE-2021-1462


TITLE

Cisco Systems  Cisco Catalyst SD-WAN Manager  Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-021894

DESCRIPTION

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to elevate privileges on an affected system. To exploit this vulnerability, an attacker would need to have a valid Administrator account on an affected system. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to an affected system with an Administrator account and creating a malicious file, which the system would parse at a later time. A successful exploit could allow the attacker to obtain root privileges on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Systems Cisco Catalyst SD-WAN Manager There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-1462 // JVNDB: JVNDB-2021-021894

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.302

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.099

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.303

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.098

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.0.1a

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:20.1.12

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.097

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.4.0.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.2

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.3.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.2.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:19.1.0

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 1.0

vendor:ciscomodel:catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.4.0.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.8

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.4

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.4.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.1

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.2.0

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.10

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.5

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.6

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.7

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:17.2.9

Trust: 0.8

vendor:シスコシステムズmodel:cisco catalyst sd-wan managerscope:eqversion:18.3.3.1

Trust: 0.8

sources: JVNDB: JVNDB-2021-021894 // NVD: CVE-2021-1462

CVSS

SEVERITY

CVSSV2

CVSSV3

psirt@cisco.com: CVE-2021-1462
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2021-1462
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-1462
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202103-308
value: MEDIUM

Trust: 0.6

psirt@cisco.com: CVE-2021-1462
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 3.6
version: 3.0

Trust: 1.0

nvd@nist.gov: CVE-2021-1462
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2021-1462
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-021894 // CNNVD: CNNVD-202103-308 // NVD: CVE-2021-1462 // NVD: CVE-2021-1462

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

problemtype:Inappropriate input confirmation (CWE-20) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-021894 // NVD: CVE-2021-1462

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202103-308

PATCH

title:cisco-sa-sdwan-privesc-vman-kth3c82Burl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-vman-kth3c82B

Trust: 0.8

title:Cisco SD-WAN vManage Software Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=143719

Trust: 0.6

sources: JVNDB: JVNDB-2021-021894 // CNNVD: CNNVD-202103-308

EXTERNAL IDS

db:NVDid:CVE-2021-1462

Trust: 3.2

db:JVNDBid:JVNDB-2021-021894

Trust: 0.8

db:AUSCERTid:ESB-2021.0776

Trust: 0.6

db:CNNVDid:CNNVD-202103-308

Trust: 0.6

sources: JVNDB: JVNDB-2021-021894 // CNNVD: CNNVD-202103-308 // NVD: CVE-2021-1462

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-privesc-vman-kth3c82b

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2021-1462

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-sdwan-privesc-vman-kth3c82b

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0776

Trust: 0.6

sources: JVNDB: JVNDB-2021-021894 // CNNVD: CNNVD-202103-308 // NVD: CVE-2021-1462

SOURCES

db:JVNDBid:JVNDB-2021-021894
db:CNNVDid:CNNVD-202103-308
db:NVDid:CVE-2021-1462

LAST UPDATE DATE

2025-08-06T22:57:07.948000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-021894date:2025-08-05T05:17:00
db:CNNVDid:CNNVD-202103-308date:2021-08-16T00:00:00
db:NVDid:CVE-2021-1462date:2025-08-04T14:32:07.550

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-021894date:2025-08-05T00:00:00
db:CNNVDid:CNNVD-202103-308date:2021-03-03T00:00:00
db:NVDid:CVE-2021-1462date:2024-11-18T16:15:11.087