Vulnerability Details CVE-2021-1437
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.2%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-1437
-
cpe:2.3:a:cisco:aironet_access_point_software:-
-
cpe:2.3:a:cisco:wireless_lan_controller_software:*
-
cpe:2.3:h:cisco:1100_integrated_services_router:-
-
cpe:2.3:h:cisco:aironet_1540:-
-
cpe:2.3:h:cisco:aironet_1560:-
-
cpe:2.3:h:cisco:aironet_1800:-
-
cpe:2.3:h:cisco:aironet_2800:-
-
cpe:2.3:h:cisco:aironet_3800:-
-
cpe:2.3:h:cisco:aironet_4800:-
-
cpe:2.3:h:cisco:catalyst_9100:-
-
cpe:2.3:h:cisco:catalyst_9800:-
-
cpe:2.3:h:cisco:catalyst_iw6300:-
-
cpe:2.3:h:cisco:esw6300:-
-
cpe:2.3:o:cisco:catalyst_9800_firmware:17.1
-
cpe:2.3:o:cisco:catalyst_9800_firmware:17.2
-
cpe:2.3:o:cisco:catalyst_9800_firmware:17.3