Lucene search

K
cve[email protected]CVE-2020-3213
HistoryJun 03, 2020 - 6:15 p.m.

CVE-2020-3213

2020-06-0318:15:19
CWE-264
web.nvd.nist.gov
30
cisco
ios xe
rommon
vulnerability
privilege escalation
nvd
cve-2020-3213

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the ROMMON of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to those of the root user of the underlying operating system. The vulnerability is due to the ROMMON allowing for special parameters to be passed to the device at initial boot up. An attacker could exploit this vulnerability by sending parameters to the device at initial boot up. An exploit could allow the attacker to elevate from a Priv15 user to the root user and execute arbitrary commands with the privileges of the root user.

Affected configurations

NVD
Node
ciscoios_xeMatch3.8.0s
OR
ciscoios_xeMatch3.8.1s
OR
ciscoios_xeMatch3.8.2s
OR
ciscoios_xeMatch3.9.0as
OR
ciscoios_xeMatch3.9.0s
OR
ciscoios_xeMatch3.9.1as
OR
ciscoios_xeMatch3.9.1s
OR
ciscoios_xeMatch3.9.2s
OR
ciscoios_xeMatch3.10.0s
OR
ciscoios_xeMatch3.10.1s
OR
ciscoios_xeMatch3.10.2as
OR
ciscoios_xeMatch3.10.2s
OR
ciscoios_xeMatch3.10.2ts
OR
ciscoios_xeMatch3.10.3s
OR
ciscoios_xeMatch3.10.4s
OR
ciscoios_xeMatch3.10.5s
OR
ciscoios_xeMatch3.10.6s
OR
ciscoios_xeMatch3.10.7s
OR
ciscoios_xeMatch3.10.8as
OR
ciscoios_xeMatch3.10.8s
OR
ciscoios_xeMatch3.10.9s
OR
ciscoios_xeMatch3.10.10s
OR
ciscoios_xeMatch3.11.0s
OR
ciscoios_xeMatch3.11.1s
OR
ciscoios_xeMatch3.11.2s
OR
ciscoios_xeMatch3.11.3s
OR
ciscoios_xeMatch3.11.4s
OR
ciscoios_xeMatch3.12.0as
OR
ciscoios_xeMatch3.12.0s
OR
ciscoios_xeMatch3.12.1s
OR
ciscoios_xeMatch3.12.2s
OR
ciscoios_xeMatch3.12.3s
OR
ciscoios_xeMatch3.12.4s
OR
ciscoios_xeMatch3.13.0as
OR
ciscoios_xeMatch3.13.0s
OR
ciscoios_xeMatch3.13.1s
OR
ciscoios_xeMatch3.13.2as
OR
ciscoios_xeMatch3.13.2s
OR
ciscoios_xeMatch3.13.3s
OR
ciscoios_xeMatch3.13.4s
OR
ciscoios_xeMatch3.13.5as
OR
ciscoios_xeMatch3.13.5s
OR
ciscoios_xeMatch3.13.6as
OR
ciscoios_xeMatch3.13.6bs
OR
ciscoios_xeMatch3.13.6s
OR
ciscoios_xeMatch3.13.7as
OR
ciscoios_xeMatch3.13.7s
OR
ciscoios_xeMatch3.13.8s
OR
ciscoios_xeMatch3.13.9s
OR
ciscoios_xeMatch3.13.10s
OR
ciscoios_xeMatch3.14.0s
OR
ciscoios_xeMatch3.14.1s
OR
ciscoios_xeMatch3.14.2s
OR
ciscoios_xeMatch3.14.3s
OR
ciscoios_xeMatch3.14.4s
OR
ciscoios_xeMatch3.15.0s
OR
ciscoios_xeMatch3.15.1cs
OR
ciscoios_xeMatch3.15.1s
OR
ciscoios_xeMatch3.15.2s
OR
ciscoios_xeMatch3.15.3s
OR
ciscoios_xeMatch3.15.4s
OR
ciscoios_xeMatch3.16.0as
OR
ciscoios_xeMatch3.16.0bs
OR
ciscoios_xeMatch3.16.0cs
OR
ciscoios_xeMatch3.16.0s
OR
ciscoios_xeMatch3.16.1as
OR
ciscoios_xeMatch3.16.2as
OR
ciscoios_xeMatch3.16.2bs
OR
ciscoios_xeMatch3.16.2s
OR
ciscoios_xeMatch3.16.3as
OR
ciscoios_xeMatch3.16.3s
OR
ciscoios_xeMatch3.16.4as
OR
ciscoios_xeMatch3.16.4bs
OR
ciscoios_xeMatch3.16.4cs
OR
ciscoios_xeMatch3.16.4ds
OR
ciscoios_xeMatch3.16.4es
OR
ciscoios_xeMatch3.16.4gs
OR
ciscoios_xeMatch3.16.4s
OR
ciscoios_xeMatch3.16.5as
OR
ciscoios_xeMatch3.16.5bs
OR
ciscoios_xeMatch3.16.5s
OR
ciscoios_xeMatch3.16.6bs
OR
ciscoios_xeMatch3.16.6s
OR
ciscoios_xeMatch3.16.7as
OR
ciscoios_xeMatch3.16.7bs
OR
ciscoios_xeMatch3.16.7s
OR
ciscoios_xeMatch3.16.8s
OR
ciscoios_xeMatch3.16.9s
OR
ciscoios_xeMatch3.16.10s
OR
ciscoios_xeMatch3.17.0s
OR
ciscoios_xeMatch3.17.1as
OR
ciscoios_xeMatch3.17.1s
OR
ciscoios_xeMatch3.17.2s
OR
ciscoios_xeMatch3.17.3s
OR
ciscoios_xeMatch3.17.4s
OR
ciscoios_xeMatch3.18.0s
OR
ciscoios_xeMatch3.18.0sp
OR
ciscoios_xeMatch3.18.1bsp
OR
ciscoios_xeMatch3.18.1csp
OR
ciscoios_xeMatch3.18.1gsp
OR
ciscoios_xeMatch3.18.1hsp
OR
ciscoios_xeMatch3.18.1isp
OR
ciscoios_xeMatch3.18.1s
OR
ciscoios_xeMatch3.18.1sp
OR
ciscoios_xeMatch3.18.2s
OR
ciscoios_xeMatch3.18.2sp
OR
ciscoios_xeMatch3.18.3s
OR
ciscoios_xeMatch3.18.3sp
OR
ciscoios_xeMatch3.18.4s
OR
ciscoios_xeMatch3.18.4sp
OR
ciscoios_xeMatch3.18.5sp
OR
ciscoios_xeMatch3.18.6sp
OR
ciscoios_xeMatch3.18.7sp
OR
ciscoios_xeMatch3.18.8sp
OR
ciscoios_xeMatch16.1.1
OR
ciscoios_xeMatch16.1.2
OR
ciscoios_xeMatch16.1.3
OR
ciscoios_xeMatch16.2.1
OR
ciscoios_xeMatch16.2.2
OR
ciscoios_xeMatch16.3.1
OR
ciscoios_xeMatch16.3.1a
OR
ciscoios_xeMatch16.3.2
OR
ciscoios_xeMatch16.3.3
OR
ciscoios_xeMatch16.3.4
OR
ciscoios_xeMatch16.3.5
OR
ciscoios_xeMatch16.3.5b
OR
ciscoios_xeMatch16.3.6
OR
ciscoios_xeMatch16.3.7
OR
ciscoios_xeMatch16.3.8
OR
ciscoios_xeMatch16.3.9
OR
ciscoios_xeMatch16.4.1
OR
ciscoios_xeMatch16.4.2
OR
ciscoios_xeMatch16.4.3
OR
ciscoios_xeMatch16.5.1
OR
ciscoios_xeMatch16.5.1a
OR
ciscoios_xeMatch16.5.1b
OR
ciscoios_xeMatch16.5.2
OR
ciscoios_xeMatch16.5.3
OR
ciscoios_xeMatch16.6.1
OR
ciscoios_xeMatch16.6.2
OR
ciscoios_xeMatch16.6.3
OR
ciscoios_xeMatch16.6.4
OR
ciscoios_xeMatch16.6.4a
OR
ciscoios_xeMatch16.6.4s
OR
ciscoios_xeMatch16.6.5
OR
ciscoios_xeMatch16.6.5a
OR
ciscoios_xeMatch16.6.5b
OR
ciscoios_xeMatch16.6.6
OR
ciscoios_xeMatch16.6.7
OR
ciscoios_xeMatch16.6.7a
OR
ciscoios_xeMatch16.7.1
OR
ciscoios_xeMatch16.7.2
OR
ciscoios_xeMatch16.7.3
OR
ciscoios_xeMatch16.8.1
OR
ciscoios_xeMatch16.8.1a
OR
ciscoios_xeMatch16.8.1b
OR
ciscoios_xeMatch16.8.1c
OR
ciscoios_xeMatch16.8.1s
OR
ciscoios_xeMatch16.8.2
OR
ciscoios_xeMatch16.8.3
OR
ciscoios_xeMatch16.9.1
OR
ciscoios_xeMatch16.9.1a
OR
ciscoios_xeMatch16.9.1b
OR
ciscoios_xeMatch16.9.1c
OR
ciscoios_xeMatch16.9.1d
OR
ciscoios_xeMatch16.9.1s
OR
ciscoios_xeMatch16.9.2
OR
ciscoios_xeMatch16.9.2a
OR
ciscoios_xeMatch16.9.2s
OR
ciscoios_xeMatch16.9.3
OR
ciscoios_xeMatch16.9.3a
OR
ciscoios_xeMatch16.9.3h
OR
ciscoios_xeMatch16.9.3s
OR
ciscoios_xeMatch16.9.4
OR
ciscoios_xeMatch16.9.4c
OR
ciscoios_xeMatch16.10.1
OR
ciscoios_xeMatch16.10.1a
OR
ciscoios_xeMatch16.10.1b
OR
ciscoios_xeMatch16.10.1e
OR
ciscoios_xeMatch16.10.1s
OR
ciscoios_xeMatch16.10.2
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1b
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.1s
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t

CNA Affected

[
  {
    "product": "Cisco IOS XE Software 3.8.0S",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2020-3213