Lucene search

K
cveCiscoCVE-2020-3417
HistorySep 24, 2020 - 6:15 p.m.

CVE-2020-3417

2020-09-2418:15:18
CWE-78
cisco
web.nvd.nist.gov
97
cisco
ios xe
vulnerability
authenticated
local attacker
code execution
boot time
chain of trust
rom monitor
rommon
nvd

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.2%

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to execute persistent code at boot time and break the chain of trust. This vulnerability is due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit this vulnerability by installing code to a specific directory in the underlying operating system (OS) and setting a specific ROMMON variable. A successful exploit could allow the attacker to execute persistent code on the underlying OS. To exploit this vulnerability, the attacker would need access to the root shell on the device or have physical access to the device.

Affected configurations

Nvd
Node
ciscoios_xeMatch3.18.0sp
OR
ciscoios_xeMatch3.18.1asp
OR
ciscoios_xeMatch3.18.1bsp
OR
ciscoios_xeMatch3.18.1csp
OR
ciscoios_xeMatch3.18.1gsp
OR
ciscoios_xeMatch3.18.1hsp
OR
ciscoios_xeMatch3.18.1isp
OR
ciscoios_xeMatch3.18.1sp
OR
ciscoios_xeMatch3.18.2asp
OR
ciscoios_xeMatch3.18.2sp
OR
ciscoios_xeMatch3.18.3asp
OR
ciscoios_xeMatch3.18.3bsp
OR
ciscoios_xeMatch3.18.3sp
OR
ciscoios_xeMatch3.18.4sp
OR
ciscoios_xeMatch3.18.5sp
OR
ciscoios_xeMatch3.18.6sp
OR
ciscoios_xeMatch3.18.7sp
OR
ciscoios_xeMatch3.18.8asp
OR
ciscoios_xeMatch3.18.8sp
OR
ciscoios_xeMatch16.6.1
OR
ciscoios_xeMatch16.6.2
OR
ciscoios_xeMatch16.6.3
OR
ciscoios_xeMatch16.6.4
OR
ciscoios_xeMatch16.6.4a
OR
ciscoios_xeMatch16.6.4s
OR
ciscoios_xeMatch16.6.5
OR
ciscoios_xeMatch16.6.5a
OR
ciscoios_xeMatch16.6.5b
OR
ciscoios_xeMatch16.6.6
OR
ciscoios_xeMatch16.6.7
OR
ciscoios_xeMatch16.6.7a
OR
ciscoios_xeMatch16.7.1
OR
ciscoios_xeMatch16.7.1a
OR
ciscoios_xeMatch16.7.1b
OR
ciscoios_xeMatch16.7.2
OR
ciscoios_xeMatch16.7.3
OR
ciscoios_xeMatch16.7.4
OR
ciscoios_xeMatch16.8.1
OR
ciscoios_xeMatch16.8.1a
OR
ciscoios_xeMatch16.8.1b
OR
ciscoios_xeMatch16.8.1c
OR
ciscoios_xeMatch16.8.1d
OR
ciscoios_xeMatch16.8.1e
OR
ciscoios_xeMatch16.8.1s
OR
ciscoios_xeMatch16.8.2
OR
ciscoios_xeMatch16.8.3
OR
ciscoios_xeMatch16.9.1
OR
ciscoios_xeMatch16.9.1a
OR
ciscoios_xeMatch16.9.1b
OR
ciscoios_xeMatch16.9.1c
OR
ciscoios_xeMatch16.9.1d
OR
ciscoios_xeMatch16.9.1s
OR
ciscoios_xeMatch16.9.2
OR
ciscoios_xeMatch16.9.2a
OR
ciscoios_xeMatch16.9.2s
OR
ciscoios_xeMatch16.9.3
OR
ciscoios_xeMatch16.9.3a
OR
ciscoios_xeMatch16.9.3h
OR
ciscoios_xeMatch16.9.3s
OR
ciscoios_xeMatch16.9.4
OR
ciscoios_xeMatch16.9.4c
OR
ciscoios_xeMatch16.9.5
OR
ciscoios_xeMatch16.9.5f
OR
ciscoios_xeMatch16.10.1
OR
ciscoios_xeMatch16.10.1a
OR
ciscoios_xeMatch16.10.1b
OR
ciscoios_xeMatch16.10.1c
OR
ciscoios_xeMatch16.10.1d
OR
ciscoios_xeMatch16.10.1e
OR
ciscoios_xeMatch16.10.1f
OR
ciscoios_xeMatch16.10.1g
OR
ciscoios_xeMatch16.10.1s
OR
ciscoios_xeMatch16.10.2
OR
ciscoios_xeMatch16.10.3
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1b
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.1s
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1a
OR
ciscoios_xeMatch16.12.1c
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t
OR
ciscoios_xeMatch16.12.1w
OR
ciscoios_xeMatch16.12.1x
OR
ciscoios_xeMatch16.12.1y
OR
ciscoios_xeMatch16.12.2
OR
ciscoios_xeMatch16.12.2a
OR
ciscoios_xeMatch16.12.2s
OR
ciscoios_xeMatch16.12.2t
OR
ciscoios_xeMatch16.12.3
OR
ciscoios_xeMatch16.12.3a
OR
ciscoios_xeMatch17.1.1
OR
ciscoios_xeMatch17.1.1a
OR
ciscoios_xeMatch17.1.1s
OR
ciscoios_xeMatch17.1.1t
VendorProductVersionCPE
ciscoios_xe3.18.0spcpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*
ciscoios_xe3.18.1aspcpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*
ciscoios_xe3.18.1bspcpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*
ciscoios_xe3.18.1cspcpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*
ciscoios_xe3.18.1gspcpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*
ciscoios_xe3.18.1hspcpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*
ciscoios_xe3.18.1ispcpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*
ciscoios_xe3.18.1spcpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*
ciscoios_xe3.18.2aspcpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*
ciscoios_xe3.18.2spcpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*
Rows per page:
1-10 of 981

CNA Affected

[
  {
    "product": "Cisco IOS XE Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

6.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0

Percentile

5.2%