Lucene search

K
ciscoCiscoCISCO-SA-20161115-IOSXE
HistoryNov 15, 2016 - 4:00 p.m.

Cisco IOS XE Software Directory Traversal Vulnerability

2016-11-1516:00:00
tools.cisco.com
13

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system.

The vulnerability is due to insufficient validation of files submitted to the affected installation utility. An attacker could exploit this vulnerability by uploading a crafted file to an affected system and running the installation utility command. A successful exploit could allow the attacker to gain write access to some files in the underlying operating system, which could allow the attacker to override the write-accessible files and compromise the integrity of the system.

To exploit this vulnerability, the attacker must have sufficient privileges to execute the appropriate commands. In a default configuration, the privilege 15 privilege is needed to exploit this vulnerability. As a secondary impact of this vulnerability, an attacker may be able to modify some files and obtain access to the underlying operating system shell without having to provide a valid license.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe”]

Affected configurations

Vulners
Node
ciscorvs4000_softwareMatch3.2se
OR
ciscorvs4000_softwareMatch3.3se
OR
ciscorvs4000_softwareMatch3.3xo
OR
ciscorvs4000_softwareMatch3.5e
OR
ciscorvs4000_softwareMatch3.6e
OR
ciscorvs4000_softwareMatch3.7e
OR
ciscorvs4000_softwareMatch16.1
OR
ciscorvs4000_softwareMatch16.2
OR
ciscorvs4000_softwareMatch3.8e
OR
ciscorvs4000_softwareMatch16.3
OR
ciscorvs4000_softwareMatch3.9e
OR
ciscorvs4000_softwareMatch3.2.0se
OR
ciscorvs4000_softwareMatch3.2.1se
OR
ciscorvs4000_softwareMatch3.2.2se
OR
ciscorvs4000_softwareMatch3.2.3se
OR
ciscorvs4000_softwareMatch3.3.0se
OR
ciscorvs4000_softwareMatch3.3.1se
OR
ciscorvs4000_softwareMatch3.3.2se
OR
ciscorvs4000_softwareMatch3.3.3se
OR
ciscorvs4000_softwareMatch3.3.4se
OR
ciscorvs4000_softwareMatch3.3.5se
OR
ciscorvs4000_softwareMatch3.3.0xo
OR
ciscorvs4000_softwareMatch3.3.1xo
OR
ciscorvs4000_softwareMatch3.3.2xo
OR
ciscorvs4000_softwareMatch3.5.0e
OR
ciscorvs4000_softwareMatch3.5.1e
OR
ciscorvs4000_softwareMatch3.5.2e
OR
ciscorvs4000_softwareMatch3.5.3e
OR
ciscorvs4000_softwareMatch3.6.0e
OR
ciscorvs4000_softwareMatch3.6.1e
OR
ciscorvs4000_softwareMatch3.6.0ae
OR
ciscorvs4000_softwareMatch3.6.0be
OR
ciscorvs4000_softwareMatch3.6.2ae
OR
ciscorvs4000_softwareMatch3.6.2e
OR
ciscorvs4000_softwareMatch3.6.3e
OR
ciscorvs4000_softwareMatch3.6.4e
OR
ciscorvs4000_softwareMatch3.6.5e
OR
ciscorvs4000_softwareMatch3.7.0e
OR
ciscorvs4000_softwareMatch3.7.1e
OR
ciscorvs4000_softwareMatch3.7.2e
OR
ciscorvs4000_softwareMatch3.7.3e
OR
ciscorvs4000_softwareMatch3.7.4e
OR
ciscorvs4000_softwareMatch16.1.1
OR
ciscorvs4000_softwareMatch16.1.2
OR
ciscorvs4000_softwareMatch16.1.3
OR
ciscorvs4000_softwareMatch16.2.1
OR
ciscorvs4000_softwareMatch16.2.2
OR
ciscorvs4000_softwareMatch3.8.0e
OR
ciscorvs4000_softwareMatch3.8.1e
OR
ciscorvs4000_softwareMatch3.8.2e
OR
ciscorvs4000_softwareMatch16.3.1
OR
ciscorvs4000_softwareMatch16.3.1a
OR
ciscorvs4000_softwareMatch3.9.0e

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

2.5 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20161115-IOSXE