Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2021-1220
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
Multiple vulnerabilities in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to cause the web UI software to become unresponsive and consume vty line instances, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient error handling in the web UI. An attacker could exploit these vulnerabilities by sending crafted HTTP packets to an affected device. A successful exploit could allow the attacker to cause the web UI software to become unresponsive and consume all available vty lines, preventing new session establishment and resulting in a DoS condition. Manual intervention would be required to regain web UI and vty session functionality. Note: These vulnerabilities do not affect the console connection..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.5/10
- Exploit Score
- 6.8/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- Single
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 2.8/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- Low
- Impact Score
- 1.4/10
- Confidentiality Impact
- None
- Availability Impact
- Low
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:* |
Yes
|
- | - |