Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20306
HistoryMar 27, 2024 - 4:58 p.m.

CVE-2024-20306

2024-03-2716:58:22
cisco
github.com
1
cisco
ios xe
vulnerability
arbitrary commands
local attacker
input validation

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.5

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability in the Unified Threat Defense (UTD) configuration CLI of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying host operating system. To exploit this vulnerability, an attacker must have level 15 privileges on the affected device.

This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted CLI command to an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying operating system.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software",
    "versions": [
      {
        "status": "affected",
        "version": "17.10.1"
      },
      {
        "status": "affected",
        "version": "17.10.1a"
      },
      {
        "status": "affected",
        "version": "17.10.1b"
      },
      {
        "status": "affected",
        "version": "17.11.1"
      },
      {
        "status": "affected",
        "version": "17.11.1a"
      },
      {
        "status": "affected",
        "version": "17.12.1"
      },
      {
        "status": "affected",
        "version": "17.12.1w"
      },
      {
        "status": "affected",
        "version": "17.12.1a"
      },
      {
        "status": "affected",
        "version": "17.11.99SW"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "ios_xe",
    "versions": [
      {
        "status": "affected",
        "version": "17.10.1"
      },
      {
        "status": "affected",
        "version": "17.10.1a"
      },
      {
        "status": "affected",
        "version": "17.10.1b"
      },
      {
        "status": "affected",
        "version": "17.11.1"
      },
      {
        "status": "affected",
        "version": "17.11.1a"
      },
      {
        "status": "affected",
        "version": "17.12.1"
      },
      {
        "status": "affected",
        "version": "17.12.1w"
      },
      {
        "status": "affected",
        "version": "17.12.1a"
      },
      {
        "status": "affected",
        "version": "17.11.99SW"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

7.5

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-20306