Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24x7 Analysis & investigation.
Experts on the hunt, fighting for you.
On May 5th, Cisco announced three critical vulnerabilities impacting the SD-WAN vManage and HyperFlex HX software. The vulnerabilities are tracked as CVE-2021-1468 (CVSS: 9.8), CVE-2021-1497 (CVSS: 9.8), and CVE-2021-1505 (CVSS: 9.1). CVE-2021-1468 and CVE-2021-1497 are especially concerning as they do not require any prior authentication. Exploitation of these vulnerabilities may result in the creation of new administrator accounts, command injection, authentication bypass, and privilege escalation.
Although exploit code is not publicly available, the severity and impact of these vulnerabilities on products will make these attractive targets for future attacks. Exploitation has not been identified at this time.
eSentire has recently observed highly aggressive threat actor activity attempting to exploit public-facing services. eSentire assesses that threat actors will adopt these vulnerabilities in attacks in the near future.
What we’re doing about it
What you should do about it
CVE-2021-1468 (CVSS: 9.8) - Vulnerability impacting the Cisco SD-WAN vManage Software when operating in cluster mode, allows an unauthenticated remote attacker to send unauthorized messages resulting in the creation of new admin level accounts.
CVE-2021-1497 (CVSS: 9.8) – Vulnerability impacting the web-based management interface for Cisco HyperFlex HX Installer Virtual Machine that allows an unauthenticated, remote attacker to perform a command injection attack.
CVE-2021-1505 (CVSS: 9.1) - Vulnerability impacting the Cisco SD-WAN vManage Software when operating in cluster mode. An authenticated, remote attacker may exploit this vulnerability to bypass authorization checking and gain elevated privileges within the affected system.
In addition to these three critical vulnerabilities, Cisco also released patches for four high severity vulnerabilities: CVE-2021-1508, CVE-2021-1275, CVE-2021-1506, and CVE-2021-1498.