A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
1100-4g Integrated Services Router
Subscribe
1100-4gltegb Integrated Services Router
Subscribe
1100-4gltena Integrated Services Router
Subscribe
1100-6g Integrated Services Router
Subscribe
1100-lte Integrated Services Router
Subscribe
1100 Integrated Services Router
Subscribe
4321\/k9-rf Integrated Services Router
Subscribe
4321\/k9-ws Integrated Services Router
Subscribe
4321\/k9 Integrated Services Router
Subscribe
4331\/k9-rf Integrated Services Router
Subscribe
4331\/k9-ws Integrated Services Router
Subscribe
4331\/k9 Integrated Services Router
Subscribe
4351\/k9-rf Integrated Services Router
Subscribe
4351\/k9-ws Integrated Services Router
Subscribe
4351\/k9 Integrated Services Router
Subscribe
Asr 1000-x
Subscribe
Asr 1001
Subscribe
Asr 1001-x
Subscribe
Asr 1002
Subscribe
Asr 1002-x
Subscribe
Asr 1004
Subscribe
Asr 1006
Subscribe
Asr 1013
Subscribe
Asr 1023
Subscribe
Catalyst C9300-24p
Subscribe
Catalyst C9300-24s
Subscribe
Catalyst C9300-24t
Subscribe
Catalyst C9300-24u
Subscribe
Catalyst C9300-24ux
Subscribe
Catalyst C9300-48p
Subscribe
Catalyst C9300-48s
Subscribe
Catalyst C9300-48t
Subscribe
Catalyst C9300-48u
Subscribe
Catalyst C9300-48un
Subscribe
Catalyst C9300-48uxm
Subscribe
Catalyst C9300l-24p-4g
Subscribe
Catalyst C9300l-24p-4x
Subscribe
Catalyst C9300l-24t-4g
Subscribe
Catalyst C9300l-24t-4x
Subscribe
Catalyst C9300l-48p-4g
Subscribe
Catalyst C9300l-48p-4x
Subscribe
Catalyst C9300l-48t-4g
Subscribe
Catalyst C9300l-48t-4x
Subscribe
Catalyst C9404r
Subscribe
Catalyst C9407r
Subscribe
Catalyst C9410r
Subscribe
Catalyst C9500-12q
Subscribe
Catalyst C9500-16x
Subscribe
Catalyst C9500-24q
Subscribe
Catalyst C9500-24y4c
Subscribe
Catalyst C9500-32c
Subscribe
Catalyst C9500-32qc
Subscribe
Catalyst C9500-40x
Subscribe
Catalyst C9500-48y4c
Subscribe
Csr1000v
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24667 | A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 13 Nov 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-13T17:54:22.654Z
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3396
Updated: 2024-08-04T07:30:58.382Z
Status : Modified
Published: 2020-09-24T18:15:17.683
Modified: 2024-11-21T05:30:56.857
Link: CVE-2020-3396
No data.
OpenCVE Enrichment
No data.
EUVD