Lucene search

K
ciscoCiscoCISCO-SA-20180328-CMDINJ
HistoryMar 28, 2018 - 4:00 p.m.

Cisco IOS XE Software CLI Command Injection Vulnerabilities

2018-03-2816:00:00
tools.cisco.com
45

EPSS

0

Percentile

5.2%

Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands into the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell of an affected device and execute commands with root privileges on the device.

The vulnerabilities exist because the affected software does not sufficiently sanitize command arguments before passing commands to the Linux shell for execution. An attacker could exploit these vulnerabilities by submitting a malicious CLI command to the affected software. A successful exploit could allow the attacker to break from the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell on an affected device and execute arbitrary commands with root privileges on the device.

There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj”]

Affected configurations

Vulners
Node
ciscocisco_ios_xe_softwareMatchany
OR
ciscocisco_ios_xe_softwareMatchany
VendorProductVersionCPE
ciscocisco_ios_xe_softwareanycpe:2.3:a:cisco:cisco_ios_xe_software:any:*:*:*:*:*:*:*

EPSS

0

Percentile

5.2%

Related for CISCO-SA-20180328-CMDINJ