A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the next reboot of the device. The authenticated user must have privileged EXEC permissions on the device. The vulnerability is due to insufficient protection of values passed to a script that executes during device startup. An attacker could exploit this vulnerability by writing values to a specific file. A successful exploit could allow the attacker to execute commands with root privileges each time the affected device is restarted.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cmdinj-2MzhjM6K | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-09-24T00:00:00
Updated: 2020-09-24T18:02:13
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3403
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-24T18:15:17.963
Modified: 2022-10-27T15:47:45.373
Link: CVE-2020-3403
JSON object: View
Redhat Information
No data.
CWE