Lucene search

K
nvd[email protected]NVD:CVE-2020-3396
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3396

2020-09-2418:15:17
CWE-284
CWE-269
web.nvd.nist.gov
8
vulnerability
cisco ios xe
usb 3.0
ssd
file system
namespace
container protections
root privileges

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

12.6%

A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.

Affected configurations

Nvd
Node
ciscoios_xeMatch16.12.1
AND
cisco1100-4g_integrated_services_routerMatch-
OR
cisco1100-4gltegb_integrated_services_routerMatch-
OR
cisco1100-4gltena_integrated_services_routerMatch-
OR
cisco1100-6g_integrated_services_routerMatch-
OR
cisco1100-lte_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco4321\/k9-rf_integrated_services_routerMatch-
OR
cisco4321\/k9-ws_integrated_services_routerMatch-
OR
cisco4321\/k9_integrated_services_routerMatch-
OR
cisco4331\/k9-rf_integrated_services_routerMatch-
OR
cisco4331\/k9-ws_integrated_services_routerMatch-
OR
cisco4331\/k9_integrated_services_routerMatch-
OR
cisco4351\/k9-rf_integrated_services_routerMatch-
OR
cisco4351\/k9-ws_integrated_services_routerMatch-
OR
cisco4351\/k9_integrated_services_routerMatch-
OR
ciscoasr_1000-xMatch-
OR
ciscoasr_1001Match-
OR
ciscoasr_1001-xMatch-
OR
ciscoasr_1002Match-
OR
ciscoasr_1002-xMatch-
OR
ciscoasr_1004Match-
OR
ciscoasr_1006Match-
OR
ciscoasr_1013Match-
OR
ciscoasr_1023Match-
OR
ciscocatalyst_c9300-24pMatch-
OR
ciscocatalyst_c9300-24sMatch-
OR
ciscocatalyst_c9300-24tMatch-
OR
ciscocatalyst_c9300-24uMatch-
OR
ciscocatalyst_c9300-24uxMatch-
OR
ciscocatalyst_c9300-48pMatch-
OR
ciscocatalyst_c9300-48sMatch-
OR
ciscocatalyst_c9300-48tMatch-
OR
ciscocatalyst_c9300-48uMatch-
OR
ciscocatalyst_c9300-48unMatch-
OR
ciscocatalyst_c9300-48uxmMatch-
OR
ciscocatalyst_c9300l-24p-4gMatch-
OR
ciscocatalyst_c9300l-24p-4xMatch-
OR
ciscocatalyst_c9300l-24t-4gMatch-
OR
ciscocatalyst_c9300l-24t-4xMatch-
OR
ciscocatalyst_c9300l-48p-4gMatch-
OR
ciscocatalyst_c9300l-48p-4xMatch-
OR
ciscocatalyst_c9300l-48t-4gMatch-
OR
ciscocatalyst_c9300l-48t-4xMatch-
OR
ciscocatalyst_c9404rMatch-
OR
ciscocatalyst_c9407rMatch-
OR
ciscocatalyst_c9410rMatch-
OR
ciscocatalyst_c9500-12qMatch-
OR
ciscocatalyst_c9500-16xMatch-
OR
ciscocatalyst_c9500-24qMatch-
OR
ciscocatalyst_c9500-24y4cMatch-
OR
ciscocatalyst_c9500-32cMatch-
OR
ciscocatalyst_c9500-32qcMatch-
OR
ciscocatalyst_c9500-40xMatch-
OR
ciscocatalyst_c9500-48y4cMatch-
OR
ciscocsr1000vMatch-
VendorProductVersionCPE
ciscoios_xe16.12.1cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
cisco1100-4g_integrated_services_router-cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-4gltegb_integrated_services_router-cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-4gltena_integrated_services_router-cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-6g_integrated_services_router-cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-lte_integrated_services_router-cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100_integrated_services_router-cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cisco4321\/k9-rf_integrated_services_router-cpe:2.3:h:cisco:4321\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*
cisco4321\/k9-ws_integrated_services_router-cpe:2.3:h:cisco:4321\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*
cisco4321\/k9_integrated_services_router-cpe:2.3:h:cisco:4321\/k9_integrated_services_router:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 561

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS

0

Percentile

12.6%