#VU81670 Permissions, Privileges, and Access Controls in Cisco Systems, Inc Operating systems & Components


Published: 2023-10-06

Vulnerability identifier: #VU81670

Vulnerability risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-20235

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Catalyst IE3x00 Rugged Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc
Catalyst IR8300 Rugged Series Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Embedded Services 3300 Series Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc
Catalyst IR1100 Rugged Series Routers
Other software / Other software solutions
Catalyst IR1800 Rugged Series Routers
Other software / Other software solutions
Catalyst IR8100 Heavy Duty Series Routers
Other software / Other software solutions
Cisco IOS XE
Operating systems & Components / Operating system

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the Docker containers with the privileged runtime option are not blocked when they are in application development mode within the Cisco IOx application. A remote administrator can gain access to the underlying operating system as the root user.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Catalyst IE3x00 Rugged Series Switches: All versions

Catalyst IR1100 Rugged Series Routers: All versions

Catalyst IR1800 Rugged Series Routers: All versions

Catalyst IR8100 Heavy Duty Series Routers: All versions

Catalyst IR8300 Rugged Series Routers: All versions

Embedded Services 3300 Series Switches: All versions


External links
http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability