#VU28761 Command Injection in Cisco IOS XE


Published: 2020-06-05

Vulnerability identifier: #VU28761

Vulnerability risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-3207

CWE-ID: CWE-77

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Cisco IOS XE
Operating systems & Components / Operating system

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a local user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation checks while processing boot options. A local administrator can modify device boot options and execute arbitrary commands on the target system.

This vulnerability affects the following products if they are running affected release of Cisco IOS XE Software: 

  • Catalyst 3650 Series Switches
  • Catalyst 3850 Series Switches
  • Catalyst 9200 Series Switches
  • Catalyst 9300 Series Switches
  • Catalyst 9500 Series Switches

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Cisco IOS XE: 16.10.1


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability