Vulnerability identifier: #VU13217
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco IOS XE
Operating systems & Components /
Operating system
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code on the target system.
The vulnerability exists in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software due to boundary error when the software parses a username during login authentication. A remote unauthenticated attacker can attempt to authenticate to an affected device, trigger memory corruption and cause the affected device to reload or execute arbitrary code with elevated privileges.
Mitigation
Update to versions 16.9(0.91), 16.8(1.69), 16.8(1.10), 16.8(0.294), 16.8(0.277), 16.7(1.142).
Vulnerable software versions
Cisco IOS XE: 16.7.1, 16.8.1
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-aaa
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.