Vulnerability identifier: #VU81670
Vulnerability risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Catalyst IE3x00 Rugged Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Catalyst IR8300 Rugged Series Routers
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Embedded Services 3300 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Catalyst IR1100 Rugged Series Routers
Other software /
Other software solutions
Catalyst IR1800 Rugged Series Routers
Other software /
Other software solutions
Catalyst IR8100 Heavy Duty Series Routers
Other software /
Other software solutions
Cisco IOS XE
Operating systems & Components /
Operating system
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to the Docker containers with the privileged runtime option are not blocked when they are in application development mode within the Cisco IOx application. A remote administrator can gain access to the underlying operating system as the root user.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Catalyst IE3x00 Rugged Series Switches: All versions
Catalyst IR1100 Rugged Series Routers: All versions
Catalyst IR1800 Rugged Series Routers: All versions
Catalyst IR8100 Heavy Duty Series Routers: All versions
Catalyst IR8300 Rugged Series Routers: All versions
Embedded Services 3300 Series Switches: All versions
External links
http://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.