A vulnerability in the CLI of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, local attacker with administrative credentials to bypass restrictions on the CLI. The vulnerability is due to insufficient security mechanisms in the restricted shell implementation. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to escape the restricted shell and execute a set of normally unauthorized commands with the privileges of a non-root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials.
History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-08-26T16:16:47.130912Z

Updated: 2024-11-13T18:10:41.942Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3151

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.668Z

cve-icon NVD

Status : Modified

Published: 2020-08-26T17:15:13.083

Modified: 2024-11-21T05:30:25.937

Link: CVE-2020-3151

cve-icon Redhat

No data.