Lucene search

K
cveCiscoCVE-2017-6606
HistoryApr 07, 2017 - 5:59 p.m.

CVE-2017-6606

2017-04-0717:59:00
CWE-78
cisco
web.nvd.nist.gov
28
cisco
ios xe
vulnerability
startup script
unauthenticated attacker
arbitrary commands
root user
nvd
cve-2017-6606

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

6.4

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

48.2%

A vulnerability in a startup script of Cisco IOS XE Software could allow an unauthenticated attacker with physical access to the targeted system to execute arbitrary commands on the underlying operating system with the privileges of the root user. More Information: CSCuz06639 CSCuz42122. Known Affected Releases: 15.6(1.1)S 16.1.2 16.2.0 15.2(1)E. Known Fixed Releases: Denali-16.1.3 16.2(1.8) 16.1(2.61) 15.6(2)SP 15.6(2)S1 15.6(1)S2 15.5(3)S3a 15.5(3)S3 15.5(2)S4 15.5(1)S4 15.4(3)S6a 15.4(3)S6 15.3(3)S8a 15.3(3)S8 15.2(5)E 15.2(4)E3 15.2(3)E5 15.0(2)SQD3 15.0(1.9.2)SQD3 3.9(0)E.

Affected configurations

Nvd
Node
ciscoios_xeMatch3.1.0s
OR
ciscoios_xeMatch3.1.0sg
OR
ciscoios_xeMatch3.1.1s
OR
ciscoios_xeMatch3.1.1sg
OR
ciscoios_xeMatch3.1.2s
OR
ciscoios_xeMatch3.1.3s
OR
ciscoios_xeMatch3.1.4as
OR
ciscoios_xeMatch3.1.4s
OR
ciscoios_xeMatch3.2.0se
OR
ciscoios_xeMatch3.2.0sg
OR
ciscoios_xeMatch3.2.0xo
OR
ciscoios_xeMatch3.2.1s
OR
ciscoios_xeMatch3.2.1se
OR
ciscoios_xeMatch3.2.1sg
OR
ciscoios_xeMatch3.2.1xo
OR
ciscoios_xeMatch3.2.2s
OR
ciscoios_xeMatch3.2.2se
OR
ciscoios_xeMatch3.2.2sg
OR
ciscoios_xeMatch3.2.3se
OR
ciscoios_xeMatch3.2.3sg
OR
ciscoios_xeMatch3.2.4sg
OR
ciscoios_xeMatch3.2.5sg
OR
ciscoios_xeMatch3.2.6sg
OR
ciscoios_xeMatch3.2.7sg
OR
ciscoios_xeMatch3.2.8sg
OR
ciscoios_xeMatch3.2.9sg
OR
ciscoios_xeMatch3.2.10sg
OR
ciscoios_xeMatch3.2.11sg
OR
ciscoios_xeMatch3.3.0s
OR
ciscoios_xeMatch3.3.0se
OR
ciscoios_xeMatch3.3.0sg
OR
ciscoios_xeMatch3.3.0sq
OR
ciscoios_xeMatch3.3.0xo
OR
ciscoios_xeMatch3.3.1s
OR
ciscoios_xeMatch3.3.1se
OR
ciscoios_xeMatch3.3.1sg
OR
ciscoios_xeMatch3.3.1sq
OR
ciscoios_xeMatch3.3.1xo
OR
ciscoios_xeMatch3.3.2s
OR
ciscoios_xeMatch3.3.2se
OR
ciscoios_xeMatch3.3.2sg
OR
ciscoios_xeMatch3.3.2xo
OR
ciscoios_xeMatch3.3.3se
OR
ciscoios_xeMatch3.3.4se
OR
ciscoios_xeMatch3.3.5se
OR
ciscoios_xeMatch3.4.0as
OR
ciscoios_xeMatch3.4.0s
OR
ciscoios_xeMatch3.4.0sg
OR
ciscoios_xeMatch3.4.0sq
OR
ciscoios_xeMatch3.4.1s
OR
ciscoios_xeMatch3.4.1sg
OR
ciscoios_xeMatch3.4.1sq
OR
ciscoios_xeMatch3.4.2s
OR
ciscoios_xeMatch3.4.2sg
OR
ciscoios_xeMatch3.4.3s
OR
ciscoios_xeMatch3.4.3sg
OR
ciscoios_xeMatch3.4.4s
OR
ciscoios_xeMatch3.4.4sg
OR
ciscoios_xeMatch3.4.5s
OR
ciscoios_xeMatch3.4.5sg
OR
ciscoios_xeMatch3.4.6s
OR
ciscoios_xeMatch3.4.6sg
OR
ciscoios_xeMatch3.4.7sg
OR
ciscoios_xeMatch3.4.8sg
OR
ciscoios_xeMatch3.5.0e
OR
ciscoios_xeMatch3.5.0s
OR
ciscoios_xeMatch3.5.0sq
OR
ciscoios_xeMatch3.5.1e
OR
ciscoios_xeMatch3.5.1s
OR
ciscoios_xeMatch3.5.1sq
OR
ciscoios_xeMatch3.5.2e
OR
ciscoios_xeMatch3.5.2s
OR
ciscoios_xeMatch3.5.2sq
OR
ciscoios_xeMatch3.5.3e
OR
ciscoios_xeMatch3.6.0e
OR
ciscoios_xeMatch3.6.0s
OR
ciscoios_xeMatch3.6.1e
OR
ciscoios_xeMatch3.6.1s
OR
ciscoios_xeMatch3.6.2ae
OR
ciscoios_xeMatch3.6.2s
OR
ciscoios_xeMatch3.6.3e
OR
ciscoios_xeMatch3.6.4e
OR
ciscoios_xeMatch3.6.5ae
OR
ciscoios_xeMatch3.6.5e
OR
ciscoios_xeMatch3.6.6e
OR
ciscoios_xeMatch3.6.7e
OR
ciscoios_xeMatch3.7.0bs
OR
ciscoios_xeMatch3.7.0e
OR
ciscoios_xeMatch3.7.0s
OR
ciscoios_xeMatch3.7.1e
OR
ciscoios_xeMatch3.7.1s
OR
ciscoios_xeMatch3.7.2e
OR
ciscoios_xeMatch3.7.2s
OR
ciscoios_xeMatch3.7.2ts
OR
ciscoios_xeMatch3.7.3e
OR
ciscoios_xeMatch3.7.3s
OR
ciscoios_xeMatch3.7.4e
OR
ciscoios_xeMatch3.7.4s
OR
ciscoios_xeMatch3.7.5s
OR
ciscoios_xeMatch3.7.6s
OR
ciscoios_xeMatch3.7.7s
OR
ciscoios_xeMatch3.8.0e
OR
ciscoios_xeMatch3.8.0s
OR
ciscoios_xeMatch3.8.1e
OR
ciscoios_xeMatch3.8.1s
OR
ciscoios_xeMatch3.8.2e
OR
ciscoios_xeMatch3.8.2s
OR
ciscoios_xeMatch3.9.0s
OR
ciscoios_xeMatch3.9.1s
OR
ciscoios_xeMatch3.9.2s
OR
ciscoios_xeMatch3.10.0s
OR
ciscoios_xeMatch3.10.1s
OR
ciscoios_xeMatch3.10.1xbs
OR
ciscoios_xeMatch3.10.2s
OR
ciscoios_xeMatch3.10.2ts
OR
ciscoios_xeMatch3.10.3s
OR
ciscoios_xeMatch3.10.4s
OR
ciscoios_xeMatch3.10.5s
OR
ciscoios_xeMatch3.10.6s
OR
ciscoios_xeMatch3.10.7s
OR
ciscoios_xeMatch3.11.0s
OR
ciscoios_xeMatch3.11.1s
OR
ciscoios_xeMatch3.11.2s
OR
ciscoios_xeMatch3.11.3s
OR
ciscoios_xeMatch3.11.4s
OR
ciscoios_xeMatch3.12.0as
OR
ciscoios_xeMatch3.12.0s
OR
ciscoios_xeMatch3.12.1s
OR
ciscoios_xeMatch3.12.2s
OR
ciscoios_xeMatch3.12.3s
OR
ciscoios_xeMatch3.12.4s
OR
ciscoios_xeMatch3.13.0as
OR
ciscoios_xeMatch3.13.0s
OR
ciscoios_xeMatch3.13.1s
OR
ciscoios_xeMatch3.13.2as
OR
ciscoios_xeMatch3.13.2s
OR
ciscoios_xeMatch3.13.3s
OR
ciscoios_xeMatch3.13.4s
OR
ciscoios_xeMatch3.13.5as
OR
ciscoios_xeMatch3.13.5s
OR
ciscoios_xeMatch3.14.0s
OR
ciscoios_xeMatch3.14.1s
OR
ciscoios_xeMatch3.14.2s
OR
ciscoios_xeMatch3.14.3s
OR
ciscoios_xeMatch3.15.0s
OR
ciscoios_xeMatch3.15.1cs
OR
ciscoios_xeMatch3.15.1s
OR
ciscoios_xeMatch3.15.2s
OR
ciscoios_xeMatch3.15.3s
OR
ciscoios_xeMatch3.16.0cs
OR
ciscoios_xeMatch3.16.0s
OR
ciscoios_xeMatch3.16.1as
OR
ciscoios_xeMatch3.16.1s
OR
ciscoios_xeMatch3.16.2as
OR
ciscoios_xeMatch3.16.2bs
OR
ciscoios_xeMatch3.16.2s
OR
ciscoios_xeMatch3.17.0s
OR
ciscoios_xeMatch3.17.1as
OR
ciscoios_xeMatch3.17.1s
OR
ciscoios_xeMatch3.18.0as
OR
ciscoios_xeMatch3.18.0s
OR
ciscoios_xeMatch16.1.1
OR
ciscoios_xeMatch16.1.2
OR
ciscoios_xeMatch16.2.1
VendorProductVersionCPE
ciscoios_xe3.1.0scpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*
ciscoios_xe3.1.0sgcpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*
ciscoios_xe3.1.1scpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*
ciscoios_xe3.1.1sgcpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*
ciscoios_xe3.1.2scpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*
ciscoios_xe3.1.3scpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*
ciscoios_xe3.1.4ascpe:2.3:o:cisco:ios_xe:3.1.4as:*:*:*:*:*:*:*
ciscoios_xe3.1.4scpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*
ciscoios_xe3.2.0secpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*
ciscoios_xe3.2.0sgcpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*
Rows per page:
1-10 of 1641

CNA Affected

[
  {
    "product": "Cisco IOS XE",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco IOS XE"
      }
    ]
  }
]

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

6.4

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

6.7

Confidence

High

EPSS

0.001

Percentile

48.2%

Related for CVE-2017-6606