Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Software NETCONF and RESTCONF Authentication Bypass Vulnerability

cisco-sa-aaa-Yx47ZT8Q · Critical · Published · Updated

A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: Install, manipulate, or delete the configuration of an affected device Cause memory corruption that results in a denial of service (DoS) on an affected device This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There is a workaround that addresses this vulnerability: Remove the enable password and configure an enable secret. For more information, see Cisco Guide to Harden Cisco IOS Devices ["https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc14"].

There is also a mitigation that addresses this vulnerability: To limit the attack surface of this vulnerability, ensure that access control lists (ACLs) are in place for NETCONF and RESTCONF to prevent attempted access from untrusted subnets. For more information, see NETCONF and RESTCONF Service-Level ACLs ["https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/1611/b_1611_programmability_cg/service_level_ACLs_NETCONF_RESTCONF.html"].

While this workaround and this mitigation have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2021-1619
Cisco Bug IDsCSCvt53563
CVSS ScoreBase 9.8
Base 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 16.3.1, Cisco IOS XE Software 16.3.2, Cisco IOS XE Software 16.3.3, Cisco IOS XE Software 16.3.1a, Cisco IOS XE Software 16.3.4, Cisco IOS XE Software 16.3.5, Cisco IOS XE Software 16.3.5b, Cisco IOS XE Software 16.3.6, Cisco IOS XE Software 16.3.7, Cisco IOS XE Software 16.3.8, Cisco IOS XE Software 16.3.9, Cisco IOS XE Software 16.3.10, Cisco IOS XE Software 16.3.11, Cisco IOS XE Software 16.4.1, Cisco IOS XE Software 16.4.2, Cisco IOS XE Software 16.4.3, Cisco IOS XE Software 16.5.1, Cisco IOS XE Software 16.5.1a, Cisco IOS XE Software 16.5.1b, Cisco IOS XE Software 16.5.2, Cisco IOS XE Software 16.5.3, Cisco IOS XE Software 16.6.1, Cisco IOS XE Software 16.6.2, Cisco IOS XE Software 16.6.3, Cisco IOS XE Software 16.6.4, Cisco IOS XE Software 16.6.5, Cisco IOS XE Software 16.6.4s, Cisco IOS XE Software 16.6.4a, Cisco IOS XE Software 16.6.5a, Cisco IOS XE Software 16.6.6, Cisco IOS XE Software 16.6.5b, Cisco IOS XE Software 16.6.7, Cisco IOS XE Software 16.6.7a, Cisco IOS XE Software 16.6.8, Cisco IOS XE Software 16.6.9, Cisco IOS XE Software 16.7.1, Cisco IOS XE Software 16.7.1a, Cisco IOS XE Software 16.7.1b, Cisco IOS XE Software 16.7.2, Cisco IOS XE Software 16.7.3, Cisco IOS XE Software 16.7.4, Cisco IOS XE Software 16.8.1, Cisco IOS XE Software 16.8.1a, Cisco IOS XE Software 16.8.1b, Cisco IOS XE Software 16.8.1s, Cisco IOS XE Software 16.8.1c, Cisco IOS XE Software 16.8.1d, Cisco IOS XE Software 16.8.2, Cisco IOS XE Software 16.8.1e, Cisco IOS XE Software 16.8.3, Cisco IOS XE Software 16.9.1, Cisco IOS XE Software 16.9.2, Cisco IOS XE Software 16.9.1a, Cisco IOS XE Software 16.9.1b, Cisco IOS XE Software 16.9.1s, Cisco IOS XE Software 16.9.1c, Cisco IOS XE Software 16.9.1d, Cisco IOS XE Software 16.9.3, Cisco IOS XE Software 16.9.2a, Cisco IOS XE Software 16.9.2s, Cisco IOS XE Software 16.9.3h, Cisco IOS XE Software 16.9.4, Cisco IOS XE Software 16.9.3s, Cisco IOS XE Software 16.9.3a, Cisco IOS XE Software 16.9.4c, Cisco IOS XE Software 16.9.5, Cisco IOS XE Software 16.9.5f, Cisco IOS XE Software 16.9.6, Cisco IOS XE Software 16.9.7, Cisco IOS XE Software 16.10.1, Cisco IOS XE Software 16.10.1a, Cisco IOS XE Software 16.10.1b, Cisco IOS XE Software 16.10.1s, Cisco IOS XE Software 16.10.1c, Cisco IOS XE Software 16.10.1e, Cisco IOS XE Software 16.10.1d, Cisco IOS XE Software 16.10.2, Cisco IOS XE Software 16.10.1f, Cisco IOS XE Software 16.10.1g, Cisco IOS XE Software 16.10.3, Cisco IOS XE Software 16.11.1, Cisco IOS XE Software 16.11.1a, Cisco IOS XE Software 16.11.1b, Cisco IOS XE Software 16.11.2, Cisco IOS XE Software 16.11.1s, Cisco IOS XE Software 16.11.1c, Cisco IOS XE Software 16.12.1, Cisco IOS XE Software 16.12.1s, Cisco IOS XE Software 16.12.1a, Cisco IOS XE Software 16.12.1c, Cisco IOS XE Software 16.12.1w, Cisco IOS XE Software 16.12.2, Cisco IOS XE Software 16.12.1y, Cisco IOS XE Software 16.12.2a, Cisco IOS XE Software 16.12.3, Cisco IOS XE Software 16.12.2s, Cisco IOS XE Software 16.12.1x, Cisco IOS XE Software 16.12.1t, Cisco IOS XE Software 16.12.2t, Cisco IOS XE Software 16.12.4, Cisco IOS XE Software 16.12.3s, Cisco IOS XE Software 16.12.1z, Cisco IOS XE Software 16.12.3a, Cisco IOS XE Software 16.12.4a, Cisco IOS XE Software 16.12.5, Cisco IOS XE Software 16.12.1z1, Cisco IOS XE Software 16.12.5a, Cisco IOS XE Software 16.12.5b, Cisco IOS XE Software 16.12.1z2, Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1a, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1r, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.2.1v, Cisco IOS XE Software 17.11.99SW, Cisco IOS XE Catalyst SD-WAN 16.9.1, Cisco IOS XE Catalyst SD-WAN 16.9.2, Cisco IOS XE Catalyst SD-WAN 16.9.3, Cisco IOS XE Catalyst SD-WAN 16.9.4, Cisco IOS XE Catalyst SD-WAN 16.10.1, Cisco IOS XE Catalyst SD-WAN 16.10.2, Cisco IOS XE Catalyst SD-WAN 16.10.3, Cisco IOS XE Catalyst SD-WAN 16.10.3a, Cisco IOS XE Catalyst SD-WAN 16.10.3b, Cisco IOS XE Catalyst SD-WAN 16.10.4, Cisco IOS XE Catalyst SD-WAN 16.10.5, Cisco IOS XE Catalyst SD-WAN 16.10.6, Cisco IOS XE Catalyst SD-WAN 16.11.1a, Cisco IOS XE Catalyst SD-WAN 16.11.1b, Cisco IOS XE Catalyst SD-WAN 16.11.1f, Cisco IOS XE Catalyst SD-WAN 16.12.1b, Cisco IOS XE Catalyst SD-WAN 16.12.1d, Cisco IOS XE Catalyst SD-WAN 16.12.1e, Cisco IOS XE Catalyst SD-WAN 16.12.2r, Cisco IOS XE Catalyst SD-WAN 16.12.3, Cisco IOS XE Catalyst SD-WAN 16.12.4, Cisco IOS XE Catalyst SD-WAN 16.12.4a, Cisco IOS XE Catalyst SD-WAN 16.12.5, Cisco IOS XE Catalyst SD-WAN

Related Products

Product CVE Evidence
Cisco IOS CVE-2021-1619 Cisco OpenVuln
Cisco Integrated Services Virtual Router CVE-2021-1619 Cisco OpenVuln
Cisco 4000 Series Integrated Services Routers CVE-2021-1619 Cisco OpenVuln
Cisco 1000 Series Integrated Services Routers CVE-2021-1619 Cisco OpenVuln
Cisco Cloud Services Router 1000V Series CVE-2021-1619 Cisco OpenVuln
Cisco 1100 Series Industrial Integrated Services Routers CVE-2021-1619 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-1619 Cisco OpenVuln
Cisco IOS XE Catalyst SD-WAN CVE-2021-1619 Cisco OpenVuln
Cisco ASR 1000 Series Aggregation Services Routers CVE-2021-1619 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2021-1619 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2021-1619 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2021-1619 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2021-1619 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2021-1619 Cisco OpenVuln · software-dependent