Lucene search

K
ciscoCiscoCISCO-SA-20161115-IOSXE
HistoryNov 15, 2016 - 4:00 p.m.

Cisco IOS XE Software Directory Traversal Vulnerability

2016-11-1516:00:00
tools.cisco.com
14

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

CVSS3

2.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0

Percentile

5.1%

A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system.

The vulnerability is due to insufficient validation of files submitted to the affected installation utility. An attacker could exploit this vulnerability by uploading a crafted file to an affected system and running the installation utility command. A successful exploit could allow the attacker to gain write access to some files in the underlying operating system, which could allow the attacker to override the write-accessible files and compromise the integrity of the system.

To exploit this vulnerability, the attacker must have sufficient privileges to execute the appropriate commands. In a default configuration, the privilege 15 privilege is needed to exploit this vulnerability. As a secondary impact of this vulnerability, an attacker may be able to modify some files and obtain access to the underlying operating system shell without having to provide a valid license.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161115-iosxe”]

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.2sexe
OR
ciscocisco_iosMatch3.3sexe
OR
ciscocisco_iosMatch3.3xoxe
OR
ciscocisco_iosMatch3.5exe
OR
ciscocisco_iosMatch3.6exe
OR
ciscocisco_iosMatch3.7exe
OR
ciscocisco_iosMatch16.1xe
OR
ciscocisco_iosMatch16.2xe
OR
ciscocisco_iosMatch3.8exe
OR
ciscocisco_iosMatch16.3xe
OR
ciscocisco_iosMatch3.9exe
OR
ciscocisco_iosMatch3.2.0sexe
OR
ciscocisco_iosMatch3.2.1sexe
OR
ciscocisco_iosMatch3.2.2sexe
OR
ciscocisco_iosMatch3.2.3sexe
OR
ciscocisco_iosMatch3.3.0sexe
OR
ciscocisco_iosMatch3.3.1sexe
OR
ciscocisco_iosMatch3.3.2sexe
OR
ciscocisco_iosMatch3.3.3sexe
OR
ciscocisco_iosMatch3.3.4sexe
OR
ciscocisco_iosMatch3.3.5sexe
OR
ciscocisco_iosMatch3.3.0xoxe
OR
ciscocisco_iosMatch3.3.1xoxe
OR
ciscocisco_iosMatch3.3.2xoxe
OR
ciscocisco_iosMatch3.5.0exe
OR
ciscocisco_iosMatch3.5.1exe
OR
ciscocisco_iosMatch3.5.2exe
OR
ciscocisco_iosMatch3.5.3exe
OR
ciscocisco_iosMatch3.6.0exe
OR
ciscocisco_iosMatch3.6.1exe
OR
ciscocisco_iosMatch3.6.0aexe
OR
ciscocisco_iosMatch3.6.0bexe
OR
ciscocisco_iosMatch3.6.2aexe
OR
ciscocisco_iosMatch3.6.2exe
OR
ciscocisco_iosMatch3.6.3exe
OR
ciscocisco_iosMatch3.6.4exe
OR
ciscocisco_iosMatch3.6.5exe
OR
ciscocisco_iosMatch3.7.0exe
OR
ciscocisco_iosMatch3.7.1exe
OR
ciscocisco_iosMatch3.7.2exe
OR
ciscocisco_iosMatch3.7.3exe
OR
ciscocisco_iosMatch3.7.4exe
OR
ciscocisco_iosMatch16.1.1xe
OR
ciscocisco_iosMatch16.1.2xe
OR
ciscocisco_iosMatch16.1.3xe
OR
ciscocisco_iosMatch16.2.1xe
OR
ciscocisco_iosMatch16.2.2xe
OR
ciscocisco_iosMatch3.8.0exe
OR
ciscocisco_iosMatch3.8.1exe
OR
ciscocisco_iosMatch3.8.2exe
OR
ciscocisco_iosMatch16.3.1xe
OR
ciscocisco_iosMatch16.3.1axe
OR
ciscocisco_iosMatch3.9.0exe
VendorProductVersionCPE
ciscocisco_ios3.2secpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:*
ciscocisco_ios3.3secpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:*
ciscocisco_ios3.3xocpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:*
ciscocisco_ios3.5ecpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:*
ciscocisco_ios3.6ecpe:2.3:o:cisco:cisco_ios:3.6e:xe:*:*:*:*:*:*
ciscocisco_ios3.7ecpe:2.3:o:cisco:cisco_ios:3.7e:xe:*:*:*:*:*:*
ciscocisco_ios16.1cpe:2.3:o:cisco:cisco_ios:16.1:xe:*:*:*:*:*:*
ciscocisco_ios16.2cpe:2.3:o:cisco:cisco_ios:16.2:xe:*:*:*:*:*:*
ciscocisco_ios3.8ecpe:2.3:o:cisco:cisco_ios:3.8e:xe:*:*:*:*:*:*
ciscocisco_ios16.3cpe:2.3:o:cisco:cisco_ios:16.3:xe:*:*:*:*:*:*
Rows per page:
1-10 of 531

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:N/I:P/A:N

CVSS3

2.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20161115-IOSXE