Privilege escalation in Cisco IOS XE Software Plug-and-Play



Published: 2021-03-24
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2021-1442
CWE-ID CWE-532
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Cisco IOS XE
Operating systems & Components / Operating system

Cisco Catalyst 9800 Series Wireless Controllers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9600 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9200 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 1100 Series Industrial Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9400 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9500 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9300 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 1000 Series Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 4000 Series Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 3650 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Cloud Services Router 1000V Series
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco ASR 1000 Series Aggregation Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU51704

Risk: Low

CVSSv3.1: 6.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-1442

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software. A local low-privileged user can run the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device and obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco IOS XE: 16.9.1 - 17.1.1s

Cisco Catalyst 9800 Series Wireless Controllers: All versions

Cisco Catalyst 9600 Series Switches: All versions

Cisco Catalyst 9200 Series Switches: All versions

Cisco 1100 Series Industrial Integrated Services Routers: All versions

Cisco Catalyst 9400 Series Switches: All versions

Cisco Catalyst 9500 Series Switches: All versions

Cisco Catalyst 9300 Series Switches: All versions

Cisco 1000 Series Integrated Services Routers: All versions

Cisco 4000 Series Integrated Services Routers: All versions

Cisco Catalyst 3650 Series Switches: All versions

Cisco Cloud Services Router 1000V Series: All versions

Cisco ASR 1000 Series Aggregation Services Routers: All versions

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvt41030


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###