Lucene search

K
ciscoCiscoCISCO-SA-IOS-XE-EVSS-CODE-EXE-8CW5VSVW
HistoryMar 24, 2021 - 4:00 p.m.

Cisco IOS XE Software Easy Virtual Switching System Arbitrary Code Execution Vulnerability

2021-03-2416:00:00
tools.cisco.com
103
cisco
ios xe
easy virtual switching system
arbitrary code execution
vulnerability
cisco catalyst 4500
remote attacker
linux operating system
buffer overflow
denial of service
software update

EPSS

0.004

Percentile

74.9%

A vulnerability in the Easy Virtual Switching System (VSS) feature of Cisco IOS XE Software for Cisco Catalyst 4500 Series Switches and Cisco Catalyst 4500-X Series Switches could allow an unauthenticated, remote attacker to execute arbitrary code on the underlying Linux operating system of an affected device.

The vulnerability is due to incorrect boundary checks of certain values in Easy VSS protocol packets that are destined for an affected device. An attacker could exploit this vulnerability by sending crafted Easy VSS protocol packets to UDP port 5500 while the affected device is in a specific state. When the crafted packet is processed, a buffer overflow condition may occur. A successful exploit could allow the attacker to trigger a denial of service (DoS) condition or execute arbitrary code with root privileges on the underlying Linux operating system of the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-evss-code-exe-8cw5VSvw”]

This advisory is part of the March 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74408”].

Affected configurations

Vulners
Node
ciscocisco_ios_xe_softwareMatch3.6e
OR
ciscocisco_ios_xe_softwareMatch3.7e
OR
ciscocisco_ios_xe_softwareMatch3.8e
OR
ciscocisco_ios_xe_softwareMatch3.9e
OR
ciscocisco_ios_xe_softwareMatch3.10e
OR
ciscocisco_ios_xe_softwareMatch16.11
OR
ciscocisco_ios_xe_softwareMatch16.12
OR
ciscocisco_ios_xe_softwareMatch3.11e
OR
ciscocisco_ios_xe_softwareMatch17.3
OR
ciscocisco_ios_xe_softwareMatch17.10
OR
ciscocisco_ios_xe_softwareMatch17.8
OR
ciscocisco_ios_xe_softwareMatch3.6.0e
OR
ciscocisco_ios_xe_softwareMatch3.6.1e
OR
ciscocisco_ios_xe_softwareMatch3.6.0be
OR
ciscocisco_ios_xe_softwareMatch3.6.2e
OR
ciscocisco_ios_xe_softwareMatch3.6.3e
OR
ciscocisco_ios_xe_softwareMatch3.6.4e
OR
ciscocisco_ios_xe_softwareMatch3.6.5e
OR
ciscocisco_ios_xe_softwareMatch3.6.6e
OR
ciscocisco_ios_xe_softwareMatch3.6.5ae
OR
ciscocisco_ios_xe_softwareMatch3.6.5be
OR
ciscocisco_ios_xe_softwareMatch3.6.7e
OR
ciscocisco_ios_xe_softwareMatch3.6.8e
OR
ciscocisco_ios_xe_softwareMatch3.6.9e
OR
ciscocisco_ios_xe_softwareMatch3.6.10e
OR
ciscocisco_ios_xe_softwareMatch3.7.0e
OR
ciscocisco_ios_xe_softwareMatch3.7.1e
OR
ciscocisco_ios_xe_softwareMatch3.7.2e
OR
ciscocisco_ios_xe_softwareMatch3.7.3e
OR
ciscocisco_ios_xe_softwareMatch3.7.4e
OR
ciscocisco_ios_xe_softwareMatch3.7.5e
OR
ciscocisco_ios_xe_softwareMatch3.8.0e
OR
ciscocisco_ios_xe_softwareMatch3.8.1e
OR
ciscocisco_ios_xe_softwareMatch3.8.2e
OR
ciscocisco_ios_xe_softwareMatch3.8.3e
OR
ciscocisco_ios_xe_softwareMatch3.8.4e
OR
ciscocisco_ios_xe_softwareMatch3.8.5e
OR
ciscocisco_ios_xe_softwareMatch3.8.5ae
OR
ciscocisco_ios_xe_softwareMatch3.8.6e
OR
ciscocisco_ios_xe_softwareMatch3.8.7e
OR
ciscocisco_ios_xe_softwareMatch3.8.8e
OR
ciscocisco_ios_xe_softwareMatch3.8.9e
OR
ciscocisco_ios_xe_softwareMatch3.8.10e
OR
ciscocisco_ios_xe_softwareMatch3.9.0e
OR
ciscocisco_ios_xe_softwareMatch3.9.1e
OR
ciscocisco_ios_xe_softwareMatch3.9.2e
OR
ciscocisco_ios_xe_softwareMatch3.9.2be
OR
ciscocisco_ios_xe_softwareMatch3.10.0e
OR
ciscocisco_ios_xe_softwareMatch3.10.1e
OR
ciscocisco_ios_xe_softwareMatch3.10.0ce
OR
ciscocisco_ios_xe_softwareMatch3.10.2e
OR
ciscocisco_ios_xe_softwareMatch3.10.1ae
OR
ciscocisco_ios_xe_softwareMatch3.10.1se
OR
ciscocisco_ios_xe_softwareMatch3.10.3e
OR
ciscocisco_ios_xe_softwareMatch16.11.2
OR
ciscocisco_ios_xe_softwareMatch16.12.5a
OR
ciscocisco_ios_xe_softwareMatch3.11.0e
OR
ciscocisco_ios_xe_softwareMatch3.11.1e
OR
ciscocisco_ios_xe_softwareMatch3.11.2e
OR
ciscocisco_ios_xe_softwareMatch3.11.3e
OR
ciscocisco_ios_xe_softwareMatch3.11.1ae
OR
ciscocisco_ios_xe_softwareMatch3.11.2ae
OR
ciscocisco_ios_xe_softwareMatch3.11.3ae
OR
ciscocisco_ios_xe_softwareMatch17.3.1
OR
ciscocisco_ios_xe_softwareMatch17.10.1a
OR
ciscocisco_ios_xe_softwareMatch17.8.1
VendorProductVersionCPE
ciscocisco_ios_xe_software3.6ecpe:2.3:a:cisco:cisco_ios_xe_software:3.6e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software3.7ecpe:2.3:a:cisco:cisco_ios_xe_software:3.7e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software3.8ecpe:2.3:a:cisco:cisco_ios_xe_software:3.8e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software3.9ecpe:2.3:a:cisco:cisco_ios_xe_software:3.9e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software3.10ecpe:2.3:a:cisco:cisco_ios_xe_software:3.10e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software16.11cpe:2.3:a:cisco:cisco_ios_xe_software:16.11:*:*:*:*:*:*:*
ciscocisco_ios_xe_software16.12cpe:2.3:a:cisco:cisco_ios_xe_software:16.12:*:*:*:*:*:*:*
ciscocisco_ios_xe_software3.11ecpe:2.3:a:cisco:cisco_ios_xe_software:3.11e:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.3cpe:2.3:a:cisco:cisco_ios_xe_software:17.3:*:*:*:*:*:*:*
ciscocisco_ios_xe_software17.10cpe:2.3:a:cisco:cisco_ios_xe_software:17.10:*:*:*:*:*:*:*
Rows per page:
1-10 of 661

EPSS

0.004

Percentile

74.9%

Related for CISCO-SA-IOS-XE-EVSS-CODE-EXE-8CW5VSVW