#VU87888 Trust Boundary Violation in Cisco Systems, Inc products - CVE-2024-20265
Published: March 28, 2024
Vulnerability identifier: #VU87888
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2024-20265
CWE-ID: CWE-501
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
6300 Series Embedded Services Access Points
Aironet 4800 Access Points
Business 100 Series Mesh Extenders
Business 200 Series Access Points
Catalyst 9105AX Series Access Points
Catalyst 9120AX Series Access Points
Catalyst 9124AX Series
Catalyst 9130AX Series Access Points
Catalyst Cellular Gateways
Catalyst IW6300 Heavy Duty Series Access Points
Wireless LAN Controller Software
Cisco Aironet 1540 Series Access Points
Aironet 1560 Series Access Points
Aironet 1800 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Catalyst 9115 Series Access Points
Catalyst 9136 Series Access Points
Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers
Business Wireless Access Point Software
Catalyst 9800 Series Wireless Controller Software
6300 Series Embedded Services Access Points
Aironet 4800 Access Points
Business 100 Series Mesh Extenders
Business 200 Series Access Points
Catalyst 9105AX Series Access Points
Catalyst 9120AX Series Access Points
Catalyst 9124AX Series
Catalyst 9130AX Series Access Points
Catalyst Cellular Gateways
Catalyst IW6300 Heavy Duty Series Access Points
Wireless LAN Controller Software
Cisco Aironet 1540 Series Access Points
Aironet 1560 Series Access Points
Aironet 1800 Series Access Points
Aironet 2800 Series Access Points
Aironet 3800 Series Access Points
Catalyst 9115 Series Access Points
Catalyst 9136 Series Access Points
Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers
Business Wireless Access Point Software
Catalyst 9800 Series Wireless Controller Software
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to unnecessary commands are available during boot time at the physical console. An authenticated attacker with physical access can bypass the Cisco Secure Boot functionality and load arbitrary software image on the target device.
Remediation
Install updates from vendor's website.