Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-6886 | A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user. |
Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-07T21:52:19.550Z
Reserved: 2020-11-13T00:00:00.000Z
Link: CVE-2021-1419
Updated: 2024-08-03T16:11:17.241Z
Status : Modified
Published: 2021-09-23T03:15:07.697
Modified: 2024-11-21T05:44:19.193
Link: CVE-2021-1419
No data.
OpenCVE Enrichment
No data.
EUVD