CVE-2021-1572
📋 TL;DR
CVE-2021-1572 is a privilege escalation vulnerability in Cisco ConfD software that allows authenticated local attackers to execute arbitrary commands as root. The vulnerability occurs when the ConfD built-in SSH server is enabled, causing the SFTP user service to run with elevated privileges. Any user with valid credentials on an affected device can exploit this to gain root access.
💻 Affected Systems
- Cisco ConfD
- Cisco Network Services Orchestrator (NSO)
📦 What is this software?
Confd by Cisco
Confd by Cisco
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full root access to the system, enabling complete compromise, data theft, persistence, and lateral movement.
Likely Case
Privileged user or compromised account escalates to root to install malware, steal sensitive data, or pivot to other systems.
If Mitigated
Attack is prevented through patching or disabling the vulnerable SSH server, limiting impact to normal user privileges.
🎯 Exploit Status
Exploitation requires valid user credentials and access to the SFTP interface. Attack chain is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ConfD 7.4.1 and later, NSO versions with updated ConfD components
Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4
Restart Required: Yes
Instructions:
1. Download and install ConfD 7.4.1 or later from Cisco. 2. Apply the patch to all affected systems. 3. Restart ConfD services. 4. Verify the SSH server configuration is properly secured.
🔧 Temporary Workarounds
Disable ConfD Built-in SSH Server
linuxDisable the vulnerable SSH server component to prevent exploitation
confd --stop-ssh
Edit ConfD configuration to disable SSH server
Restrict SSH Access
allLimit SSH access to trusted users and networks only
Configure firewall rules to restrict SSH port access
Use SSH key authentication only
🧯 If You Can't Patch
- Disable the ConfD built-in SSH server immediately
- Implement strict access controls and monitor all SSH authentication attempts
🔍 How to Verify
Check if Vulnerable:
Check ConfD version with 'confd --version' and verify if SSH server is enabled in configuration
Check Version:
confd --version
Verify Fix Applied:
Verify ConfD version is 7.4.1 or later and test privilege escalation attempts fail
📡 Detection & Monitoring
Log Indicators:
- Unusual SFTP command sequences
- Multiple failed then successful SSH logins
- Privilege escalation attempts in system logs
Network Indicators:
- Unusual SSH traffic patterns to ConfD systems
- SFTP connections followed by privileged commands
SIEM Query:
source="confd.log" AND ("SFTP" OR "privilege") AND ("escalation" OR "root")
🔗 References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-priv-esc-XXqRtTfT
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confd-priv-esc-LsGtCRx4
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-priv-esc-XXqRtTfT