Description
A vulnerability in the processing of boot options of specific Cisco IOS XE Software switches could allow an authenticated, local attacker with root shell access to the underlying operating system (OS) to conduct a command injection attack during device boot. This vulnerability is due to insufficient input validation checks while processing boot options. An attacker could exploit this vulnerability by modifying device boot options to execute attacker-provided code. A successful exploit may allow an attacker to bypass the Secure Boot process and execute malicious code on an affected device with root-level privileges.
Published: 2020-06-03
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24478 A vulnerability in the processing of boot options of specific Cisco IOS XE Software switches could allow an authenticated, local attacker with root shell access to the underlying operating system (OS) to conduct a command injection attack during device boot. This vulnerability is due to insufficient input validation checks while processing boot options. An attacker could exploit this vulnerability by modifying device boot options to execute attacker-provided code. A successful exploit may allow an attacker to bypass the Secure Boot process and execute malicious code on an affected device with root-level privileges.
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Catalyst 3650-12x48uq Catalyst 3650-12x48ur Catalyst 3650-12x48uz Catalyst 3650-24pd Catalyst 3650-24pdm Catalyst 3650-48fq Catalyst 3650-48fqm Catalyst 3650-8x24uq Catalyst 3850-24xs Catalyst 3850-48xs Catalyst 3850-nm-2-40g Catalyst 3850-nm-8-10g Catalyst C9200-24p Catalyst C9200-24t Catalyst C9200-48p Catalyst C9200-48t Catalyst C9200l-24p-4g Catalyst C9200l-24p-4x Catalyst C9200l-24pxg-2y Catalyst C9200l-24pxg-4x Catalyst C9200l-24t-4g Catalyst C9200l-24t-4x Catalyst C9200l-48p-4g Catalyst C9200l-48p-4x Catalyst C9200l-48pxg-2y Catalyst C9200l-48pxg-4x Catalyst C9200l-48t-4g Catalyst C9200l-48t-4x Catalyst C9300-24p Catalyst C9300-24s Catalyst C9300-24t Catalyst C9300-24u Catalyst C9300-24ux Catalyst C9300-48p Catalyst C9300-48s Catalyst C9300-48t Catalyst C9300-48u Catalyst C9300-48un Catalyst C9300-48uxm Catalyst C9300l-24p-4g Catalyst C9300l-24p-4x Catalyst C9300l-24t-4g Catalyst C9300l-24t-4x Catalyst C9300l-48p-4g Catalyst C9300l-48p-4x Catalyst C9300l-48t-4g Catalyst C9300l-48t-4x Catalyst C9500-12q Catalyst C9500-16x Catalyst C9500-24q Catalyst C9500-24y4c Catalyst C9500-32c Catalyst C9500-32qc Catalyst C9500-40x Catalyst C9500-48y4c Ios Xe
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-15T17:18:45.307Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3207

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.749Z

cve-icon NVD

Status : Modified

Published: 2020-06-03T18:15:18.747

Modified: 2024-11-21T05:30:33.603

Link: CVE-2020-3207

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses