CVE-2021-1514 (CNNVD-202105-144)
中文标题:
Cisco SD-WAN vManage 操作系统命令注入漏洞
英文标题:
Cisco SD-WAN Software Privilege Escalation Vulnerability
漏洞描述
中文描述:
Cisco SD-WAN vManage是美国思科(Cisco)公司的一款可提供软件定义网络功能的软件。该软件为网络虚拟化的一种方式。 Cisco SD-WAN vManage 存在操作系统命令注入漏洞,本地攻击者可利用该漏洞注入任意命令以执行该漏洞是由于某些CLI命令的输入验证不足造成的。
英文描述:
A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco SD-WAN Solution | n/a | - | - |
cpe:2.3:a:cisco:cisco_sd-wan_solution:n_a:*:*:*:*:*:*:*
|
| cisco | catalyst_sd-wan_manager | * | - | - |
cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*
|
| cisco | sd-wan_vbond_orchestrator | * | - | - |
cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*
|
| cisco | sd-wan_vmanage | * | - | - |
cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*
|
| cisco | vsmart_controller_firmware | * | - | - |
cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_100_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_1000_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_100b_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_100m_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_100wm_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_2000_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_5000_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge-100b_firmware | * | - | - |
cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*
|
| cisco | vedge_cloud_firmware | * | - | - |
cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1514 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1514 |
2025-11-11 14:57:36 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202105-144 |
2025-11-11 15:10:38 | 2025-11-11 07:56:44 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202105-144
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 14
- data_sources: ['cve'] -> ['cve', 'nvd']