A vulnerability in a startup script of Cisco IOS XE Software could allow an unauthenticated attacker with physical access to the targeted system to execute arbitrary commands on the underlying operating system with the privileges of the root user.
The vulnerability is due to insufficient validation of ROMMON variables values. An attacker could exploit this vulnerability by manipulating the content of some ROMMON variables, which will allow an external script containing the command to execute at boot time. A reload of the affected system is needed to exploit the vulnerability. An attacker would need console access to exploit this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-iosxe [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-iosxe”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_ios | 3.2sg | cpe:2.3:o:cisco:cisco_ios:3.2sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.7s | cpe:2.3:o:cisco:cisco_ios:3.7s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3sg | cpe:2.3:o:cisco:cisco_ios:3.3sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.8s | cpe:2.3:o:cisco:cisco_ios:3.8s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.9s | cpe:2.3:o:cisco:cisco_ios:3.9s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.2se | cpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3se | cpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3xo | cpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.4sg | cpe:2.3:o:cisco:cisco_ios:3.4sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.5e | cpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:* |