CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
Low
EPSS
Percentile
9.0%
A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_ios_xe_software | 17.6.1 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.2 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.2:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.1w | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1w:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.1a | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1a:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.1x | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1x:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.3 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.3:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.1y | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1y:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.1z | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.1z:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.3a | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.3a:*:*:*:*:*:*:* |
cisco | cisco_ios_xe_software | 17.6.4 | cpe:2.3:a:cisco:cisco_ios_xe_software:17.6.4:*:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco IOS XE Software",
"versions": [
{
"version": "17.6.1",
"status": "affected"
},
{
"version": "17.6.2",
"status": "affected"
},
{
"version": "17.6.1w",
"status": "affected"
},
{
"version": "17.6.1a",
"status": "affected"
},
{
"version": "17.6.1x",
"status": "affected"
},
{
"version": "17.6.3",
"status": "affected"
},
{
"version": "17.6.1y",
"status": "affected"
},
{
"version": "17.6.1z",
"status": "affected"
},
{
"version": "17.6.3a",
"status": "affected"
},
{
"version": "17.6.4",
"status": "affected"
},
{
"version": "17.6.1z1",
"status": "affected"
},
{
"version": "17.6.5",
"status": "affected"
},
{
"version": "17.6.6",
"status": "affected"
},
{
"version": "17.6.6a",
"status": "affected"
},
{
"version": "17.6.5a",
"status": "affected"
},
{
"version": "17.7.1",
"status": "affected"
},
{
"version": "17.7.1a",
"status": "affected"
},
{
"version": "17.7.1b",
"status": "affected"
},
{
"version": "17.7.2",
"status": "affected"
},
{
"version": "17.10.1",
"status": "affected"
},
{
"version": "17.10.1a",
"status": "affected"
},
{
"version": "17.10.1b",
"status": "affected"
},
{
"version": "17.8.1",
"status": "affected"
},
{
"version": "17.8.1a",
"status": "affected"
},
{
"version": "17.9.1",
"status": "affected"
},
{
"version": "17.9.1w",
"status": "affected"
},
{
"version": "17.9.2",
"status": "affected"
},
{
"version": "17.9.1a",
"status": "affected"
},
{
"version": "17.9.1x",
"status": "affected"
},
{
"version": "17.9.1y",
"status": "affected"
},
{
"version": "17.9.3",
"status": "affected"
},
{
"version": "17.9.2a",
"status": "affected"
},
{
"version": "17.9.1x1",
"status": "affected"
},
{
"version": "17.9.3a",
"status": "affected"
},
{
"version": "17.9.4",
"status": "affected"
},
{
"version": "17.9.1y1",
"status": "affected"
},
{
"version": "17.9.4a",
"status": "affected"
},
{
"version": "17.11.1",
"status": "affected"
},
{
"version": "17.11.1a",
"status": "affected"
},
{
"version": "17.12.1",
"status": "affected"
},
{
"version": "17.12.1w",
"status": "affected"
},
{
"version": "17.12.1a",
"status": "affected"
},
{
"version": "17.11.99SW",
"status": "affected"
}
]
}
]