Vulnslist

find the latest Cisco vulnerabilities

Cisco Access Points SSH Management Privilege Escalation Vulnerability

cisco-sa-cisco-ap-LLjsGxv · High · Published · Updated

A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-ap-LLjsGxv

Workarounds

There are no workarounds that address this vulnerability.

However, customers who do not use the SSH management feature can disable it to close the attack vector on affected devices.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2021-1419
Cisco Bug IDsCSCvw71885
CVSS ScoreBase 7.8
Base 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Aironet Access Point Software (IOS XE Controller), Cisco Wireless LAN Controller (WLC) 8.6.101.0, Cisco Wireless LAN Controller (WLC) 8.7.102.0, Cisco Wireless LAN Controller (WLC) 8.7.106.0, Cisco Wireless LAN Controller (WLC) 8.8.100.0, Cisco Wireless LAN Controller (WLC) 8.8.111.0, Cisco Wireless LAN Controller (WLC) 8.8.120.0, Cisco Wireless LAN Controller (WLC) 8.8.125.0, Cisco Wireless LAN Controller (WLC) 8.8.130.0, Cisco Wireless LAN Controller (WLC) 8.9.100.0, Cisco Wireless LAN Controller (WLC) 8.9.111.0, Cisco Wireless LAN Controller (WLC) 8.10.105.0, Cisco Wireless LAN Controller (WLC) 8.10.112.0, Cisco Wireless LAN Controller (WLC) 8.10.113.0, Cisco Wireless LAN Controller (WLC) 8.10.120.0, Cisco Wireless LAN Controller (WLC) 8.10.121.0, Cisco Wireless LAN Controller (WLC) 8.10.122.0, Cisco Wireless LAN Controller (WLC) 8.10.130.0, Cisco Wireless LAN Controller (WLC) 8.10.141.0, Cisco Wireless LAN Controller (WLC) 8.10.150.0, Cisco Wireless LAN Controller (WLC) 8.10.142.0, Cisco Wireless LAN Controller (WLC), Cisco 5500 Series Wireless Controllers, Cisco 3500 Series Wireless Controllers, Cisco 8500 Series Wireless Controllers, Cisco Virtual Wireless Controller

Related Products

Product CVE Evidence
Cisco 5500 Series Wireless Controllers CVE-2021-1419 Cisco OpenVuln
Cisco Aironet Access Point Software CVE-2021-1419 Cisco OpenVuln
Cisco Aironet Access Point Software (IOS XE Controller) CVE-2021-1419 Cisco OpenVuln
Cisco IOS XE Software CVE-2021-1419 Cisco OpenVuln
Cisco Wireless LAN Controller (WLC) CVE-2021-1419 Cisco OpenVuln
Cisco 3500 Series Wireless Controllers CVE-2021-1419 Cisco OpenVuln
Cisco 8500 Series Wireless Controllers CVE-2021-1419 Cisco OpenVuln
Cisco Virtual Wireless Controller CVE-2021-1419 Cisco OpenVuln
Cisco 8500 Series Secure Routers CVE-2021-1419 Cisco OpenVuln