Insufficient Session Expiration in Cisco Small Business Series Switches



Published: 2021-11-04
Risk High
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2021-34739
CWE-ID CWE-613
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco 250 Series Smart Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 350 Series Managed Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 350X Series Stackable Managed Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 550X Series Stackable Managed Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco ESW2 Series Advanced Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business 200 Series Smart Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business 300 Series Managed Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business 500 Series Stackable Managed Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Insufficient Session Expiration

EUVDB-ID: #VU57958

Risk: High

CVSSv3.1: 7.4 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-34739

CWE-ID: CWE-613 - Insufficient Session Expiration

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insufficient expiration of session credentials. A remote non-authenticated attacker can obtain or guess session token, gain unauthorized access to session that belongs to another user and access the web-based management interface with administrator privileges.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco 250 Series Smart Switches: All versions

Cisco 350 Series Managed Switches: All versions

Cisco 350X Series Stackable Managed Switches: All versions

Cisco 550X Series Stackable Managed Switches: All versions

Cisco ESW2 Series Advanced Switches: All versions

Cisco Small Business 200 Series Smart Switches: All versions

Cisco Small Business 300 Series Managed Switches: All versions

Cisco Small Business 500 Series Stackable Managed Switches: All versions

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-switches-tokens-UzwpR4e5


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###