Lucene search

K
cve[email protected]CVE-2020-3404
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3404

2020-09-2418:15:18
CWE-863
web.nvd.nist.gov
32
cisco
ios xe
vulnerability
shell access
root privileges
authenticated attacker
nvd
cve-2020-3404

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges.

Affected configurations

NVD
Node
ciscoios_xeMatch16.11.1
AND
cisco1100-4g_integrated_services_routerMatch-
OR
cisco1100-4gltegb_integrated_services_routerMatch-
OR
cisco1100-4gltena_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-6g_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100-lte_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1111x-8p_integrated_services_routerMatch-
OR
cisco1111x_integrated_services_routerMatch-
OR
cisco111x_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco4221_integrated_services_routerMatch-
OR
cisco4331_integrated_services_routerMatch-
OR
cisco4431_integrated_services_routerMatch-
OR
cisco4451_integrated_services_routerMatch-
OR
cisco4461_integrated_services_routerMatch-
OR
ciscoasr_1000-xMatch-
OR
ciscoasr_1001Match-
OR
ciscoasr_1001-xMatch-
OR
ciscoasr_1002Match-
OR
ciscoasr_1002-xMatch-
OR
ciscoasr_1004Match-
OR
ciscoasr_1006Match-
OR
ciscoasr_1013Match-
OR
ciscoasr1001-hxMatch-
OR
ciscoasr1001-hx-rfMatch-
OR
ciscoasr1001-x-rfMatch-
OR
ciscoasr1001-x-wsMatch-
OR
ciscoasr1002-hxMatch-
OR
ciscoasr1002-hx-rfMatch-
OR
ciscoasr1002-hx-wsMatch-
OR
ciscoasr1002-x-rfMatch-
OR
ciscoasr1002-x-wsMatch-
OR
ciscocatalyst_9800-40Match-
OR
ciscocatalyst_9800-80Match-
OR
ciscocatalyst_9800-clMatch-
OR
ciscocatalyst_9800-lMatch-
OR
ciscocatalyst_9800-l-cMatch-
OR
ciscocatalyst_9800-l-fMatch-
OR
ciscocatalyst_c9200-24pMatch-
OR
ciscocatalyst_c9200-24tMatch-
OR
ciscocatalyst_c9200-48pMatch-
OR
ciscocatalyst_c9200-48tMatch-
OR
ciscocatalyst_c9200l-24p-4gMatch-
OR
ciscocatalyst_c9200l-24p-4xMatch-
OR
ciscocatalyst_c9200l-24pxg-2yMatch-
OR
ciscocatalyst_c9200l-24pxg-4xMatch-
OR
ciscocatalyst_c9200l-24t-4gMatch-
OR
ciscocatalyst_c9200l-24t-4xMatch-
OR
ciscocatalyst_c9200l-48p-4gMatch-
OR
ciscocatalyst_c9200l-48p-4xMatch-
OR
ciscocatalyst_c9200l-48pxg-2yMatch-
OR
ciscocatalyst_c9200l-48pxg-4xMatch-
OR
ciscocatalyst_c9200l-48t-4gMatch-
OR
ciscocatalyst_c9200l-48t-4xMatch-
OR
ciscocatalyst_c9300-24pMatch-
OR
ciscocatalyst_c9300-24sMatch-
OR
ciscocatalyst_c9300-24tMatch-
OR
ciscocatalyst_c9300-24uMatch-
OR
ciscocatalyst_c9300-24uxMatch-
OR
ciscocatalyst_c9300-48pMatch-
OR
ciscocatalyst_c9300-48sMatch-
OR
ciscocatalyst_c9300-48tMatch-
OR
ciscocatalyst_c9300-48uMatch-
OR
ciscocatalyst_c9300-48unMatch-
OR
ciscocatalyst_c9300-48uxmMatch-
OR
ciscocatalyst_c9300l-24p-4gMatch-
OR
ciscocatalyst_c9300l-24p-4xMatch-
OR
ciscocatalyst_c9300l-24t-4gMatch-
OR
ciscocatalyst_c9300l-24t-4xMatch-
OR
ciscocatalyst_c9300l-48p-4gMatch-
OR
ciscocatalyst_c9300l-48p-4xMatch-
OR
ciscocatalyst_c9300l-48t-4gMatch-
OR
ciscocatalyst_c9300l-48t-4xMatch-
OR
ciscocatalyst_c9404rMatch-
OR
ciscocatalyst_c9407rMatch-
OR
ciscocatalyst_c9410rMatch-
OR
ciscocatalyst_c9500-12qMatch-
OR
ciscocatalyst_c9500-16xMatch-
OR
ciscocatalyst_c9500-24qMatch-
OR
ciscocatalyst_c9500-24y4cMatch-
OR
ciscocatalyst_c9500-32cMatch-
OR
ciscocatalyst_c9500-32qcMatch-
OR
ciscocatalyst_c9500-40xMatch-
OR
ciscocatalyst_c9500-48y4cMatch-
OR
ciscocsr_1000v
OR
ciscows-c3650-12x48uqMatch-
OR
ciscows-c3650-12x48urMatch-
OR
ciscows-c3650-12x48uzMatch-
OR
ciscows-c3650-24pdMatch-
OR
ciscows-c3650-24pdmMatch-
OR
ciscows-c3650-24psMatch-
OR
ciscows-c3650-24tdMatch-
OR
ciscows-c3650-24tsMatch-
OR
ciscows-c3650-48fdMatch-
OR
ciscows-c3650-48fqMatch-
OR
ciscows-c3650-48fqmMatch-
OR
ciscows-c3650-48fsMatch-
OR
ciscows-c3650-48pdMatch-
OR
ciscows-c3650-48pqMatch-
OR
ciscows-c3650-48psMatch-
OR
ciscows-c3650-48tdMatch-
OR
ciscows-c3650-48tqMatch-
OR
ciscows-c3650-48tsMatch-
OR
ciscows-c3650-8x24uqMatch-
OR
ciscows-c3850Match-
OR
ciscows-c3850-12sMatch-
OR
ciscows-c3850-12x48uMatch-
OR
ciscows-c3850-12xsMatch-
OR
ciscows-c3850-24pMatch-
OR
ciscows-c3850-24sMatch-
OR
ciscows-c3850-24tMatch-
OR
ciscows-c3850-24uMatch-
OR
ciscows-c3850-24xsMatch-
OR
ciscows-c3850-24xuMatch-
OR
ciscows-c3850-48fMatch-
OR
ciscows-c3850-48pMatch-
OR
ciscows-c3850-48tMatch-
OR
ciscows-c3850-48uMatch-
OR
ciscows-c3850-48xsMatch-
CPENameOperatorVersion
cisco:ios_xecisco ios xeeq16.11.1

CNA Affected

[
  {
    "product": "Cisco IOS XE Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2020-3404