CVE-2021-1437 (CNNVD-202103-1387)
中文标题:
Cisco Aironet Series Access Points Software 安全漏洞
英文标题:
Cisco Aironet Access Points FlexConnect Upgrade Information Disclosure Vulnerability
漏洞描述
中文描述:
Cisco Aironet Series Access Points Software是美国思科(Cisco)公司的一套使用在Aironet无线接入点设备中的软件。 Cisco Aironet Series Access Points Software 存在安全漏洞,该漏洞源于不受限制的TFTP配置,未经身份验证的远程攻击者可利用该漏洞从受影响的设备获取机密信息。
英文描述:
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP).
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Aironet Access Point Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_aironet_access_point_software:n_a:*:*:*:*:*:*:*
|
| cisco | aironet_access_point_software | - | - | - |
cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*
|
| cisco | catalyst_9800_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
|
| cisco | wireless_lan_controller_software | * | - | - |
cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1437 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1437 |
2025-11-11 14:57:35 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202103-1387 |
2025-11-11 15:10:36 | 2025-11-11 07:56:39 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202103-1387
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 4
- data_sources: ['cve'] -> ['cve', 'nvd']