Lucene search

K
ciscoCiscoCISCO-SA-20151130-IOSXE3S
HistoryNov 30, 2015 - 12:00 a.m.

Cisco IOS XE 3S Platforms Series root Shell License Bypass Vulnerability

2015-11-3000:00:00
tools.cisco.com
19

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in one of the diagnostic commands in the Cisco IOS XE operating system for Cisco IOS XE 3S platforms could allow an authenticated, privileged, local attacker to gain restricted root shell access. The root shell is provided for advanced troubleshooting with Cisco Technical Assistance Center (TAC) engineers and requires a license.

The vulnerability occurs because the parameters to diagnostic commands at the command-line interface (CLI) are not properly validated. An attacker could exploit this vulnerability by authenticating to the affected device at privileged level 15 and providing crafted parameters to the diagnostic commands. An exploit could allow the authenticated, privileged attacker to bypass the license required for root shell access. If the authenticated user obtains root shell access, further compromise may be possible.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-iosxe3s[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151130-iosxe3s”]

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.7sxe
OR
ciscocisco_iosMatch3.8sxe
OR
ciscocisco_iosMatch3.9sxe
OR
ciscocisco_iosMatch3.10sxe
OR
ciscocisco_iosMatch3.11sxe
OR
ciscocisco_iosMatch3.12sxe
OR
ciscocisco_iosMatch3.13sxe
OR
ciscocisco_iosMatch3.14sxe
OR
ciscocisco_iosMatch3.15sxe
OR
ciscocisco_iosMatch3.16sxe
OR
ciscoasr_1000_series_softwareMatchany
OR
ciscocisco_iosMatch3.7.0sxe
OR
ciscocisco_iosMatch3.7.1sxe
OR
ciscocisco_iosMatch3.7.2sxe
OR
ciscocisco_iosMatch3.7.3sxe
OR
ciscocisco_iosMatch3.7.4sxe
OR
ciscocisco_iosMatch3.7.5sxe
OR
ciscocisco_iosMatch3.7.6sxe
OR
ciscocisco_iosMatch3.7.7sxe
OR
ciscocisco_iosMatch3.8.0sxe
OR
ciscocisco_iosMatch3.8.1sxe
OR
ciscocisco_iosMatch3.8.2sxe
OR
ciscocisco_iosMatch3.9.1sxe
OR
ciscocisco_iosMatch3.9.0sxe
OR
ciscocisco_iosMatch3.9.2sxe
OR
ciscocisco_iosMatch3.10.0sxe
OR
ciscocisco_iosMatch3.10.1sxe
OR
ciscocisco_iosMatch3.10.2sxe
OR
ciscocisco_iosMatch3.10.0asxe
OR
ciscocisco_iosMatch3.10.3sxe
OR
ciscocisco_iosMatch3.10.4sxe
OR
ciscocisco_iosMatch3.10.5sxe
OR
ciscocisco_iosMatch3.10.6sxe
OR
ciscocisco_iosMatch3.10.01sxe
OR
ciscocisco_iosMatch3.11.1sxe
OR
ciscocisco_iosMatch3.11.2sxe
OR
ciscocisco_iosMatch3.11.0sxe
OR
ciscocisco_iosMatch3.11.3sxe
OR
ciscocisco_iosMatch3.11.4sxe
OR
ciscocisco_iosMatch3.12.0sxe
OR
ciscocisco_iosMatch3.12.1sxe
OR
ciscocisco_iosMatch3.12.2sxe
OR
ciscocisco_iosMatch3.12.3sxe
OR
ciscocisco_iosMatch3.13.0sxe
OR
ciscocisco_iosMatch3.13.1sxe
OR
ciscocisco_iosMatch3.13.2sxe
OR
ciscocisco_iosMatch3.13.3sxe
OR
ciscocisco_iosMatch3.14.0sxe
OR
ciscocisco_iosMatch3.14.1sxe
OR
ciscocisco_iosMatch3.14.2sxe
OR
ciscocisco_iosMatch3.14.3sxe
OR
ciscocisco_iosMatch3.14.4sxe
OR
ciscocisco_iosMatch3.15.0sxe
OR
ciscocisco_iosMatch3.15.1sxe
OR
ciscocisco_iosMatch3.16.0sxe
OR
ciscoasr_9904Match1000_series_aggregation_services_routers

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20151130-IOSXE3S