{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T17:42:41.429","vulnerabilities":[{"cve":{"id":"CVE-2021-1432","sourceIdentifier":"psirt@cisco.com","published":"2021-03-24T20:15:14.510","lastModified":"2024-11-21T05:44:21.037","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as the root user. The attacker must be authenticated on the affected device as a low-privileged user to exploit this vulnerability. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by injecting arbitrary commands to a file as a lower-privileged user. The commands are then executed on the device by the root user. A successful exploit could allow the attacker to execute arbitrary commands as the root user."},{"lang":"es","value":"Una vulnerabilidad en la CLI del Software Cisco IOS XE SD-WAN, podría permitir a un atacante local autenticado ejecutar comandos arbitrarios en el sistema operativo subyacente como usuario root.&#xa0;El atacante debe estar autenticado en el dispositivo afectado como un usuario poco privilegiado para explotar esta vulnerabilidad.&#xa0;Esta vulnerabilidad es debido a una comprobación insuficiente de la entrada suministrada por el usuario.&#xa0;Un atacante podría explotar esta vulnerabilidad al inyectar comandos arbitrarios en un archivo como usuario poco privilegiado.&#xa0;A continuación, el usuario root ejecuta los comandos en el dispositivo.&#xa0;Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como usuario root"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:C/I:C/A:C","baseScore":6.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*","matchCriteriaId":"4BF22C29-84DF-44CA-B574-FE04AB39E344"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*","matchCriteriaId":"C2C7C0BA-D618-4B65-B42C-43393167EEE0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*","matchCriteriaId":"C98DED36-D4B5-48D6-964E-EEEE97936700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*","matchCriteriaId":"CD98C9E8-3EA6-4160-970D-37C389576516"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*","matchCriteriaId":"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*","matchCriteriaId":"9027A528-2588-4C06-810B-5BB313FE4323"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*","matchCriteriaId":"7745ED34-D59D-49CC-B174-96BCA03B3374"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*","matchCriteriaId":"19AF4CF3-6E79-4EA3-974D-CD451A192BA9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*","matchCriteriaId":"313BD54C-073C-4F27-82D5-C99EFC3A20F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*","matchCriteriaId":"93B96E01-3777-4C33-9225-577B469A6CE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*","matchCriteriaId":"65FC3CC1-CF4F-4A2D-A500-04395AFE8B47"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*","matchCriteriaId":"027200FC-8AD4-47E4-A404-490AE4F997EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*","matchCriteriaId":"E5019B59-508E-40B0-9C92-2C26F58E2FBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*","matchCriteriaId":"443D78BA-A3DA-4D1F-A4DF-2F426DC6B841"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*","matchCriteriaId":"1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*","matchCriteriaId":"3C6FB4DC-814D-49D2-BBE2-3861AE985A1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*","matchCriteriaId":"D5750264-2990-4942-85F4-DB9746C5CA2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*","matchCriteriaId":"02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*","matchCriteriaId":"B9173AD6-6658-4267-AAA7-D50D0B657528"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*","matchCriteriaId":"7F02EE9D-45B1-43D6-B05D-6FF19472216B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*","matchCriteriaId":"1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*","matchCriteriaId":"4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*","matchCriteriaId":"B51FA707-8DB1-4596-9122-D4BFEF17F400"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*","matchCriteriaId":"C04DF35A-1B6F-420A-8D84-74EB41BF3700"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*","matchCriteriaId":"211CC9B2-6108-4C50-AB31-DC527C43053E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe_sd-wan:*:*:*:*:*:*:*:*","matchCriteriaId":"2C87891C-B8D0-4286-B6A7-61037E1A6A54"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-sdwarbcmdexec-sspOMUr3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}