Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20398
HistorySep 11, 2024 - 4:38 p.m.

CVE-2024-20398 Cisco IOS XR Software Local Privilege Escalation Vulnerability

2024-09-1116:38:23
cisco
www.cve.org
4
cisco ios xr
local privilege escalation
vulnerability
file system access
insufficient validation
crafted commands
root privileges

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

10.2%

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to obtain read/write file system access on the underlying operating system of an affected device.

This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XR Software",
    "versions": [
      {
        "version": "6.5.3",
        "status": "affected"
      },
      {
        "version": "6.5.29",
        "status": "affected"
      },
      {
        "version": "6.5.1",
        "status": "affected"
      },
      {
        "version": "6.6.1",
        "status": "affected"
      },
      {
        "version": "6.5.2",
        "status": "affected"
      },
      {
        "version": "6.5.92",
        "status": "affected"
      },
      {
        "version": "6.5.15",
        "status": "affected"
      },
      {
        "version": "6.6.2",
        "status": "affected"
      },
      {
        "version": "7.0.1",
        "status": "affected"
      },
      {
        "version": "6.6.25",
        "status": "affected"
      },
      {
        "version": "6.5.26",
        "status": "affected"
      },
      {
        "version": "6.6.11",
        "status": "affected"
      },
      {
        "version": "6.5.25",
        "status": "affected"
      },
      {
        "version": "6.5.28",
        "status": "affected"
      },
      {
        "version": "6.5.93",
        "status": "affected"
      },
      {
        "version": "6.6.12",
        "status": "affected"
      },
      {
        "version": "6.5.90",
        "status": "affected"
      },
      {
        "version": "7.0.0",
        "status": "affected"
      },
      {
        "version": "7.1.1",
        "status": "affected"
      },
      {
        "version": "7.0.90",
        "status": "affected"
      },
      {
        "version": "6.6.3",
        "status": "affected"
      },
      {
        "version": "7.0.2",
        "status": "affected"
      },
      {
        "version": "7.1.15",
        "status": "affected"
      },
      {
        "version": "7.2.0",
        "status": "affected"
      },
      {
        "version": "7.2.1",
        "status": "affected"
      },
      {
        "version": "7.1.2",
        "status": "affected"
      },
      {
        "version": "7.0.11",
        "status": "affected"
      },
      {
        "version": "7.0.12",
        "status": "affected"
      },
      {
        "version": "7.0.14",
        "status": "affected"
      },
      {
        "version": "7.1.25",
        "status": "affected"
      },
      {
        "version": "6.6.4",
        "status": "affected"
      },
      {
        "version": "7.2.12",
        "status": "affected"
      },
      {
        "version": "7.3.1",
        "status": "affected"
      },
      {
        "version": "7.1.3",
        "status": "affected"
      },
      {
        "version": "7.4.1",
        "status": "affected"
      },
      {
        "version": "7.2.2",
        "status": "affected"
      },
      {
        "version": "6.5.31",
        "status": "affected"
      },
      {
        "version": "7.3.15",
        "status": "affected"
      },
      {
        "version": "7.3.16",
        "status": "affected"
      },
      {
        "version": "7.4.15",
        "status": "affected"
      },
      {
        "version": "6.5.32",
        "status": "affected"
      },
      {
        "version": "7.3.2",
        "status": "affected"
      },
      {
        "version": "7.5.1",
        "status": "affected"
      },
      {
        "version": "7.4.16",
        "status": "affected"
      },
      {
        "version": "7.3.27",
        "status": "affected"
      },
      {
        "version": "7.6.1",
        "status": "affected"
      },
      {
        "version": "7.5.2",
        "status": "affected"
      },
      {
        "version": "7.8.1",
        "status": "affected"
      },
      {
        "version": "7.6.15",
        "status": "affected"
      },
      {
        "version": "7.5.12",
        "status": "affected"
      },
      {
        "version": "7.8.12",
        "status": "affected"
      },
      {
        "version": "7.3.3",
        "status": "affected"
      },
      {
        "version": "7.7.1",
        "status": "affected"
      },
      {
        "version": "7.3.4",
        "status": "affected"
      },
      {
        "version": "7.4.2",
        "status": "affected"
      },
      {
        "version": "7.6.2",
        "status": "affected"
      },
      {
        "version": "7.5.3",
        "status": "affected"
      },
      {
        "version": "7.7.2",
        "status": "affected"
      },
      {
        "version": "7.9.1",
        "status": "affected"
      },
      {
        "version": "7.10.1",
        "status": "affected"
      },
      {
        "version": "7.8.2",
        "status": "affected"
      },
      {
        "version": "7.5.4",
        "status": "affected"
      },
      {
        "version": "6.5.33",
        "status": "affected"
      },
      {
        "version": "7.8.22",
        "status": "affected"
      },
      {
        "version": "7.7.21",
        "status": "affected"
      },
      {
        "version": "7.9.2",
        "status": "affected"
      },
      {
        "version": "7.3.5",
        "status": "affected"
      },
      {
        "version": "7.5.5",
        "status": "affected"
      },
      {
        "version": "7.11.1",
        "status": "affected"
      },
      {
        "version": "7.9.21",
        "status": "affected"
      },
      {
        "version": "7.10.2",
        "status": "affected"
      },
      {
        "version": "24.1.1",
        "status": "affected"
      },
      {
        "version": "7.6.3",
        "status": "affected"
      },
      {
        "version": "7.3.6",
        "status": "affected"
      },
      {
        "version": "7.5.52",
        "status": "affected"
      },
      {
        "version": "7.11.2",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

10.2%

Related for CVELIST:CVE-2024-20398