Lucene search

K
cve[email protected]CVE-2020-3393
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3393

2020-09-2418:15:17
CWE-20
CWE-269
web.nvd.nist.gov
34
3
cisco
ios xe
vulnerability
privilege escalation
root access
input validation
rbac
nvd
cve-2020-3393

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability.

Affected configurations

NVD
Node
ciscoios_xeMatch16.12.1
AND
cisco1100-4g_integrated_services_routerMatch-
OR
cisco1100-4gltegb_integrated_services_routerMatch-
OR
cisco1100-4gltena_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-6g_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100-lte_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1111x-8p_integrated_services_routerMatch-
OR
cisco1111x_integrated_services_routerMatch-
OR
cisco111x_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco4221_integrated_services_routerMatch-
OR
cisco4331_integrated_services_routerMatch-
OR
cisco4431_integrated_services_routerMatch-
OR
cisco4451_integrated_services_routerMatch-
OR
cisco4461_integrated_services_routerMatch-
OR
ciscoasr_1000-xMatch-
OR
ciscoasr_1001Match-
OR
ciscoasr_1001-xMatch-
OR
ciscoasr_1002Match-
OR
ciscoasr_1002-xMatch-
OR
ciscoasr_1004Match-
OR
ciscoasr_1006Match-
OR
ciscoasr_1013Match-
OR
ciscoasr1001-hxMatch-
OR
ciscoasr1001-hx-rfMatch-
OR
ciscoasr1001-x-rfMatch-
OR
ciscoasr1001-x-wsMatch-
OR
ciscoasr1002-hxMatch-
OR
ciscoasr1002-hx-rfMatch-
OR
ciscoasr1002-hx-wsMatch-
OR
ciscoasr1002-x-rfMatch-
OR
ciscoasr1002-x-wsMatch-
OR
ciscocatalyst_9800-40Match-
OR
ciscocatalyst_9800-80Match-
OR
ciscocatalyst_9800-clMatch-
OR
ciscocatalyst_9800-lMatch-
OR
ciscocatalyst_9800-l-cMatch-
OR
ciscocatalyst_9800-l-fMatch-
OR
ciscocatalyst_c9200-24pMatch-
OR
ciscocatalyst_c9200-24tMatch-
OR
ciscocatalyst_c9200-48pMatch-
OR
ciscocatalyst_c9200-48tMatch-
OR
ciscocatalyst_c9200l-24p-4gMatch-
OR
ciscocatalyst_c9200l-24p-4xMatch-
OR
ciscocatalyst_c9200l-24pxg-2yMatch-
OR
ciscocatalyst_c9200l-24pxg-4xMatch-
OR
ciscocatalyst_c9200l-24t-4gMatch-
OR
ciscocatalyst_c9200l-24t-4xMatch-
OR
ciscocatalyst_c9200l-48p-4gMatch-
OR
ciscocatalyst_c9200l-48p-4xMatch-
OR
ciscocatalyst_c9200l-48pxg-2yMatch-
OR
ciscocatalyst_c9200l-48pxg-4xMatch-
OR
ciscocatalyst_c9200l-48t-4gMatch-
OR
ciscocatalyst_c9200l-48t-4xMatch-
OR
ciscocatalyst_c9300-24pMatch-
OR
ciscocatalyst_c9300-24sMatch-
OR
ciscocatalyst_c9300-24tMatch-
OR
ciscocatalyst_c9300-24uMatch-
OR
ciscocatalyst_c9300-24uxMatch-
OR
ciscocatalyst_c9300-48pMatch-
OR
ciscocatalyst_c9300-48sMatch-
OR
ciscocatalyst_c9300-48tMatch-
OR
ciscocatalyst_c9300-48uMatch-
OR
ciscocatalyst_c9300-48unMatch-
OR
ciscocatalyst_c9300-48uxmMatch-
OR
ciscocatalyst_c9300l-24p-4gMatch-
OR
ciscocatalyst_c9300l-24p-4xMatch-
OR
ciscocatalyst_c9300l-24t-4gMatch-
OR
ciscocatalyst_c9300l-24t-4xMatch-
OR
ciscocatalyst_c9300l-48p-4gMatch-
OR
ciscocatalyst_c9300l-48p-4xMatch-
OR
ciscocatalyst_c9300l-48t-4gMatch-
OR
ciscocatalyst_c9300l-48t-4xMatch-
OR
ciscocatalyst_c9404rMatch-
OR
ciscocatalyst_c9407rMatch-
OR
ciscocatalyst_c9410rMatch-
OR
ciscocatalyst_c9500-12qMatch-
OR
ciscocatalyst_c9500-16xMatch-
OR
ciscocatalyst_c9500-24qMatch-
OR
ciscocatalyst_c9500-24y4cMatch-
OR
ciscocatalyst_c9500-32cMatch-
OR
ciscocatalyst_c9500-32qcMatch-
OR
ciscocatalyst_c9500-40xMatch-
OR
ciscocatalyst_c9500-48y4cMatch-
OR
ciscocsr_1000v
OR
ciscows-c3650-12x48uqMatch-
OR
ciscows-c3650-12x48urMatch-
OR
ciscows-c3650-12x48uzMatch-
OR
ciscows-c3650-24pdMatch-
OR
ciscows-c3650-24pdmMatch-
OR
ciscows-c3650-24psMatch-
OR
ciscows-c3650-24tdMatch-
OR
ciscows-c3650-24tsMatch-
OR
ciscows-c3650-48fdMatch-
OR
ciscows-c3650-48fqMatch-
OR
ciscows-c3650-48fqmMatch-
OR
ciscows-c3650-48fsMatch-
OR
ciscows-c3650-48pdMatch-
OR
ciscows-c3650-48pqMatch-
OR
ciscows-c3650-48psMatch-
OR
ciscows-c3650-48tdMatch-
OR
ciscows-c3650-48tqMatch-
OR
ciscows-c3650-48tsMatch-
OR
ciscows-c3650-8x24uqMatch-
OR
ciscows-c3850Match-
OR
ciscows-c3850-12sMatch-
OR
ciscows-c3850-12x48uMatch-
OR
ciscows-c3850-12xsMatch-
OR
ciscows-c3850-24pMatch-
OR
ciscows-c3850-24sMatch-
OR
ciscows-c3850-24tMatch-
OR
ciscows-c3850-24uMatch-
OR
ciscows-c3850-24xsMatch-
OR
ciscows-c3850-24xuMatch-
OR
ciscows-c3850-48fMatch-
OR
ciscows-c3850-48pMatch-
OR
ciscows-c3850-48tMatch-
OR
ciscows-c3850-48uMatch-
OR
ciscows-c3850-48xsMatch-
CPENameOperatorVersion
cisco:ios_xecisco ios xeeq16.12.1

CNA Affected

[
  {
    "product": "Cisco IOS XE Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2020-3393