CVE-2021-1480
HIGHCisco Catalyst SD-WAN Manager 20.4-20.4.1 and SD-WAN vManage < 19.2.4 - Unauthenticated Remote Code Execution
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2021-1480. PoCs published by xmco.
AI-analyzed exploit summary This repository contains a functional exploit for CVE-2021-1480, a privilege escalation vulnerability in Cisco SD-WAN. The exploit uses a TCP proxy to intercept and modify traffic between the confd_cli and the legitimate confd endpoint, replacing the user ID (0x3EA) with root (0x00) to execute commands as root.
Description
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
Exploits (1)
This repository contains a functional exploit for CVE-2021-1480, a privilege escalation vulnerability in Cisco SD-WAN. The exploit uses a TCP proxy to intercept and modify traffic between the confd_cli and the legitimate confd endpoint, replacing the user ID (0x3EA) with root (0x00) to execute commands as root.
References (1)
Scores
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H