Description
A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability.
Published: 2020-09-24
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24664 A vulnerability in the application-hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device. The attacker could execute IOS XE commands outside the application-hosting subsystem Docker container as well as on the underlying Linux operating system. These commands could be run as the root user. The vulnerability is due to a combination of two factors: (a) incomplete input validation of the user payload of CLI commands, and (b) improper role-based access control (RBAC) when commands are issued at the command line within the application-hosting subsystem. An attacker could exploit this vulnerability by using a CLI command with crafted user input. A successful exploit could allow the lower-privileged attacker to execute arbitrary CLI commands with root privileges. The attacker would need valid user credentials to exploit this vulnerability.
History

Thu, 19 Dec 2024 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco 1100-4g Integrated Services Router 1100-4gltegb Integrated Services Router 1100-4gltena Integrated Services Router 1100-4p Integrated Services Router 1100-6g Integrated Services Router 1100-8p Integrated Services Router 1100-lte Integrated Services Router 1100 Integrated Services Router 1101-4p Integrated Services Router 1101 Integrated Services Router 1109-2p Integrated Services Router 1109-4p Integrated Services Router 1109 Integrated Services Router 1111x-8p Integrated Services Router 1111x Integrated Services Router 111x Integrated Services Router 1120 Integrated Services Router 1160 Integrated Services Router 4221 Integrated Services Router 4331 Integrated Services Router 4431 Integrated Services Router 4451 Integrated Services Router 4461 Integrated Services Router Asr1001-hx Asr1001-hx-rf Asr1001-x-rf Asr1001-x-ws Asr1002-hx Asr1002-hx-rf Asr1002-hx-ws Asr1002-x-rf Asr1002-x-ws Asr 1000-x Asr 1001 Asr 1001-x Asr 1002 Asr 1002-x Asr 1004 Asr 1006 Asr 1013 Catalyst 9800-40 Catalyst 9800-80 Catalyst 9800-cl Catalyst 9800-l Catalyst 9800-l-c Catalyst 9800-l-f Catalyst C9200-24p Catalyst C9200-24t Catalyst C9200-48p Catalyst C9200-48t Catalyst C9200l-24p-4g Catalyst C9200l-24p-4x Catalyst C9200l-24pxg-2y Catalyst C9200l-24pxg-4x Catalyst C9200l-24t-4g Catalyst C9200l-24t-4x Catalyst C9200l-48p-4g Catalyst C9200l-48p-4x Catalyst C9200l-48pxg-2y Catalyst C9200l-48pxg-4x Catalyst C9200l-48t-4g Catalyst C9200l-48t-4x Catalyst C9300-24p Catalyst C9300-24s Catalyst C9300-24t Catalyst C9300-24u Catalyst C9300-24ux Catalyst C9300-48p Catalyst C9300-48s Catalyst C9300-48t Catalyst C9300-48u Catalyst C9300-48un Catalyst C9300-48uxm Catalyst C9300l-24p-4g Catalyst C9300l-24p-4x Catalyst C9300l-24t-4g Catalyst C9300l-24t-4x Catalyst C9300l-48p-4g Catalyst C9300l-48p-4x Catalyst C9300l-48t-4g Catalyst C9300l-48t-4x Catalyst C9404r Catalyst C9407r Catalyst C9410r Catalyst C9500-12q Catalyst C9500-16x Catalyst C9500-24q Catalyst C9500-24y4c Catalyst C9500-32c Catalyst C9500-32qc Catalyst C9500-40x Catalyst C9500-48y4c Csr 1000v Ios Xe Ws-c3650-12x48uq Ws-c3650-12x48ur Ws-c3650-12x48uz Ws-c3650-24pd Ws-c3650-24pdm Ws-c3650-24ps Ws-c3650-24td Ws-c3650-24ts Ws-c3650-48fd Ws-c3650-48fq Ws-c3650-48fqm Ws-c3650-48fs Ws-c3650-48pd Ws-c3650-48pq Ws-c3650-48ps Ws-c3650-48td Ws-c3650-48tq Ws-c3650-48ts Ws-c3650-8x24uq Ws-c3850 Ws-c3850-12s Ws-c3850-12x48u Ws-c3850-12xs Ws-c3850-24p Ws-c3850-24s Ws-c3850-24t Ws-c3850-24u Ws-c3850-24xs Ws-c3850-24xu Ws-c3850-48f Ws-c3850-48p Ws-c3850-48t Ws-c3850-48u Ws-c3850-48xs
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T17:54:13.042Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3393

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.334Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:17.587

Modified: 2024-12-19T13:52:35.190

Link: CVE-2020-3393

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses