Lucene search

K
ciscoCiscoCISCO-SA-IOSXE-PRIV-ESC-SEAX6NLX
HistoryMar 27, 2024 - 4:00 p.m.

Cisco IOS XE Software Privilege Escalation Vulnerability

2024-03-2716:00:00
tools.cisco.com
19
cisco
vulnerability
netconf
privilege escalation
remote attacker
software updates

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX”]

This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75056”].

Affected configurations

Vulners
Node
ciscocisco_iosMatch17.6xe
OR
ciscocisco_iosMatch17.7xe
OR
ciscocisco_iosMatch17.10xe
OR
ciscocisco_iosMatch17.8xe
OR
ciscocisco_iosMatch17.9xe
OR
ciscocisco_iosMatch17.11xe
OR
ciscocisco_iosMatch17.12xe
OR
ciscocisco_iosMatch17.11swxe
OR
ciscocisco_iosMatchanyxe
OR
ciscocisco_iosMatch17.6.1xe
OR
ciscocisco_iosMatch17.6.2xe
OR
ciscocisco_iosMatch17.6.1wxe
OR
ciscocisco_iosMatch17.6.1axe
OR
ciscocisco_iosMatch17.6.1xxe
OR
ciscocisco_iosMatch17.6.3xe
OR
ciscocisco_iosMatch17.6.1yxe
OR
ciscocisco_iosMatch17.6.1zxe
OR
ciscocisco_iosMatch17.6.3axe
OR
ciscocisco_iosMatch17.6.4xe
OR
ciscocisco_iosMatch17.6.1z1xe
OR
ciscocisco_iosMatch17.6.5xe
OR
ciscocisco_iosMatch17.6.6xe
OR
ciscocisco_iosMatch17.6.6axe
OR
ciscocisco_iosMatch17.6.5axe
OR
ciscocisco_iosMatch17.7.1xe
OR
ciscocisco_iosMatch17.7.1axe
OR
ciscocisco_iosMatch17.7.1bxe
OR
ciscocisco_iosMatch17.7.2xe
OR
ciscocisco_iosMatch17.10.1xe
OR
ciscocisco_iosMatch17.10.1axe
OR
ciscocisco_iosMatch17.10.1bxe
OR
ciscocisco_iosMatch17.8.1xe
OR
ciscocisco_iosMatch17.8.1axe
OR
ciscocisco_iosMatch17.9.1xe
OR
ciscocisco_iosMatch17.9.1wxe
OR
ciscocisco_iosMatch17.9.2xe
OR
ciscocisco_iosMatch17.9.1axe
OR
ciscocisco_iosMatch17.9.1xxe
OR
ciscocisco_iosMatch17.9.1yxe
OR
ciscocisco_iosMatch17.9.3xe
OR
ciscocisco_iosMatch17.9.2axe
OR
ciscocisco_iosMatch17.9.1x1xe
OR
ciscocisco_iosMatch17.9.3axe
OR
ciscocisco_iosMatch17.9.4xe
OR
ciscocisco_iosMatch17.9.1y1xe
OR
ciscocisco_iosMatch17.9.4axe
OR
ciscocisco_iosMatch17.11.1xe
OR
ciscocisco_iosMatch17.11.1axe
OR
ciscocisco_iosMatch17.12.1xe
OR
ciscocisco_iosMatch17.12.1wxe
OR
ciscocisco_iosMatch17.12.1axe
OR
ciscocisco_iosMatch17.11.99swxe
OR
ciscocisco_iosMatchanyxe

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for CISCO-SA-IOSXE-PRIV-ESC-SEAX6NLX