A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.

Project Subscriptions

Vendors Products
1100-4g Integrated Services Router Subscribe
1100-4gltegb Integrated Services Router Subscribe
1100-4gltena Integrated Services Router Subscribe
1100-6g Integrated Services Router Subscribe
1100-lte Integrated Services Router Subscribe
1100 Integrated Services Router Subscribe
4321\/k9-rf Integrated Services Router Subscribe
4321\/k9-ws Integrated Services Router Subscribe
4321\/k9 Integrated Services Router Subscribe
4331\/k9-rf Integrated Services Router Subscribe
4331\/k9-ws Integrated Services Router Subscribe
4331\/k9 Integrated Services Router Subscribe
4351\/k9-rf Integrated Services Router Subscribe
4351\/k9-ws Integrated Services Router Subscribe
4351\/k9 Integrated Services Router Subscribe
Asr 1000-x Subscribe
Asr 1001 Subscribe
Asr 1001-x Subscribe
Asr 1002 Subscribe
Asr 1002-x Subscribe
Asr 1004 Subscribe
Asr 1006 Subscribe
Asr 1013 Subscribe
Asr 1023 Subscribe
Catalyst C9300-24p Subscribe
Catalyst C9300-24s Subscribe
Catalyst C9300-24t Subscribe
Catalyst C9300-24u Subscribe
Catalyst C9300-24ux Subscribe
Catalyst C9300-48p Subscribe
Catalyst C9300-48s Subscribe
Catalyst C9300-48t Subscribe
Catalyst C9300-48u Subscribe
Catalyst C9300-48un Subscribe
Catalyst C9300-48uxm Subscribe
Catalyst C9300l-24p-4g Subscribe
Catalyst C9300l-24p-4x Subscribe
Catalyst C9300l-24t-4g Subscribe
Catalyst C9300l-24t-4x Subscribe
Catalyst C9300l-48p-4g Subscribe
Catalyst C9300l-48p-4x Subscribe
Catalyst C9300l-48t-4g Subscribe
Catalyst C9300l-48t-4x Subscribe
Catalyst C9404r Subscribe
Catalyst C9407r Subscribe
Catalyst C9410r Subscribe
Catalyst C9500-12q Subscribe
Catalyst C9500-16x Subscribe
Catalyst C9500-24q Subscribe
Catalyst C9500-24y4c Subscribe
Catalyst C9500-32c Subscribe
Catalyst C9500-32qc Subscribe
Catalyst C9500-40x Subscribe
Catalyst C9500-48y4c Subscribe
Csr1000v Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-24667 A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T17:54:22.654Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3396

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.382Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:17.683

Modified: 2024-11-21T05:30:56.857

Link: CVE-2020-3396

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses