Lucene search

K
ciscoCiscoCISCO-SA-20170322-XECI
HistoryMar 22, 2017 - 4:00 p.m.

Cisco IOS XE Software HTTP Command Injection Vulnerability

2017-03-2216:00:00
tools.cisco.com
13

EPSS

0.003

Percentile

68.8%

A vulnerability in the web framework of Cisco IOS XE Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges.

The vulnerability is due to insufficient input validation of HTTP parameters supplied by the user. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected web page parameter. The user must be authenticated to access the affected parameter. A successful exploit could allow the attacker to execute commands with root privileges.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-xeci [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-xeci”]

This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-60851”].

Affected configurations

Vulners
Node
ciscocisco_iosMatch16.2xe
OR
ciscocisco_iosMatch16.2.1xe
VendorProductVersionCPE
ciscocisco_ios16.2cpe:2.3:o:cisco:cisco_ios:16.2:xe:*:*:*:*:*:*
ciscocisco_ios16.2.1cpe:2.3:o:cisco:cisco_ios:16.2.1:xe:*:*:*:*:*:*

EPSS

0.003

Percentile

68.8%

Related for CISCO-SA-20170322-XECI