6.1
CVSSv3

CVE-2021-1543

Published: 16/06/2021 Updated: 26/04/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an malicious user to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco sf220-24_firmware

cisco sf220-24p_firmware

cisco sf220-48_firmware

cisco sf220-48p_firmware

cisco sg220-26_firmware

cisco sg220-26p_firmware

cisco sg220-28mp_firmware

cisco sg220-50_firmware

cisco sg220-50p_firmware

Vendor Advisories

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more infor ...

Github Repositories

Build docker build -t incidents Run docker run -p 8000:8000 incidents simple solution with django rest api and viewsets #URLS and examples incidents localhost:8000/api/v1/incidents/ targets - objects localhost:8000/api/v1/targets/ cve-codes localhost:8000/api/v1/cve/ incident-descriptions localhost:8000/api/v1/incident-descriptions/ f

Recent Articles

Cisco Smart Switches Riddled with Severe Security Holes
Threatpost • Tara Seals • 17 Jun 2021

Cisco has flagged and patched several high-severity security vulnerabilities in its Cisco Small Business 220 Series Smart Switches that could allow session hijacking, arbitrary code execution, cross-site scripting and HTML injection.
It also issued fixes for high-severity problems in the AnyConnect secure mobility client, the Cisco DNA Center and the Cisco Email Security Appliance, along with a slew of patches for medium-severity vulnerabilities in AnyConnect, Jabber, Meeting Server, Unifi...