CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
5.1%
A vulnerability in the package unbundle utility of Cisco IOS XE Software could allow an authenticated, local attacker to gain write access to some files in the underlying operating system.
The vulnerability is due to insufficient validation of files submitted to the affected installation utility. An attacker could exploit this vulnerability by uploading a crafted file to an affected system and running the installation utility command. A successful exploit could allow the attacker to gain write access to some files in the underlying operating system, which could allow the attacker to override the write-accessible files and compromise the integrity of the system.
To exploit this vulnerability, the attacker must have sufficient privileges to execute the appropriate commands. In a default configuration, the privilege 15 privilege is needed to exploit this vulnerability. As a secondary impact of this vulnerability, an attacker may be able to modify some files and obtain access to the underlying operating system shell without having to provide a valid license.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_ios | 3.2se | cpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3se | cpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3xo | cpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.5e | cpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.6e | cpe:2.3:o:cisco:cisco_ios:3.6e:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.7e | cpe:2.3:o:cisco:cisco_ios:3.7e:xe:*:*:*:*:*:* |
cisco | cisco_ios | 16.1 | cpe:2.3:o:cisco:cisco_ios:16.1:xe:*:*:*:*:*:* |
cisco | cisco_ios | 16.2 | cpe:2.3:o:cisco:cisco_ios:16.2:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.8e | cpe:2.3:o:cisco:cisco_ios:3.8e:xe:*:*:*:*:*:* |
cisco | cisco_ios | 16.3 | cpe:2.3:o:cisco:cisco_ios:16.3:xe:*:*:*:*:*:* |
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
EPSS
Percentile
5.1%