Lucene search

K
ciscoCiscoCISCO-SA-20141106-CVE-2014-7990
HistoryNov 06, 2014 - 8:36 p.m.

Cisco IOS XE Software Challenge/Response Bypass Vulnerability

2014-11-0620:36:24
tools.cisco.com
47

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the request system shell command supported by specific Cisco IOS XE platforms (WS-C3850, WS-C3650, AIR-CT5760, and WS-C4500X) could allow an authenticated, local attacker with administrative privilege (15) to access the underlying Linux root shell.

The vulnerability is due to improper parsing of the challenge response. An attacker could exploit this vulnerability by entering a crafted challenge response. An exploit could allow the attacker to compromise the system. The request system shell command is available only if the service internal command is configured, which is not recommended.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements could reduce the possibility of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.2sgxe
OR
ciscocisco_iosMatch3.3sgxe
OR
ciscocisco_iosMatch3.2sexe
OR
ciscocisco_iosMatch3.3sexe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.4sgxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.2.0sgxe
OR
ciscocisco_iosMatch3.2.1sgxe
OR
ciscocisco_iosMatch3.2.2sgxe
OR
ciscocisco_iosMatch3.2.3sgxe
OR
ciscocisco_iosMatch3.2.4sgxe
OR
ciscocisco_iosMatch3.2.5sgxe
OR
ciscocisco_iosMatch3.3.0sgxe
OR
ciscocisco_iosMatch3.3.2sgxe
OR
ciscocisco_iosMatch3.3.1sgxe
OR
ciscocisco_iosMatch3.2.0sexe
OR
ciscocisco_iosMatch3.2.1sexe
OR
ciscocisco_iosMatch3.2.2sexe
OR
ciscocisco_iosMatch3.2.3sexe
OR
ciscocisco_iosMatch3.3.0sexe
OR
ciscocisco_iosMatch3.3.1sexe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.4.0sgxe
OR
ciscocisco_iosMatch3.4.2sgxe
OR
ciscocisco_iosMatch3.4.1sgxe
OR
ciscocisco_iosMatch3.5.0exe
VendorProductVersionCPE
ciscocisco_ios3.2sgcpe:2.3:o:cisco:cisco_ios:3.2sg:xe:*:*:*:*:*:*
ciscocisco_ios3.3sgcpe:2.3:o:cisco:cisco_ios:3.3sg:xe:*:*:*:*:*:*
ciscocisco_ios3.2secpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:*
ciscocisco_ios3.3secpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:*
ciscocisco_ios3.3xocpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:*
ciscocisco_ios3.4sgcpe:2.3:o:cisco:cisco_ios:3.4sg:xe:*:*:*:*:*:*
ciscocisco_ios3.5ecpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:*
ciscocisco_ios3.2.0sgcpe:2.3:o:cisco:cisco_ios:3.2.0sg:xe:*:*:*:*:*:*
ciscocisco_ios3.2.1sgcpe:2.3:o:cisco:cisco_ios:3.2.1sg:xe:*:*:*:*:*:*
ciscocisco_ios3.2.2sgcpe:2.3:o:cisco:cisco_ios:3.2.2sg:xe:*:*:*:*:*:*
Rows per page:
1-10 of 271

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20141106-CVE-2014-7990