A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to inject a command to the underlying operating system that will execute with root privileges upon the next reboot of the device. The authenticated user must have privileged EXEC permissions on the device. The vulnerability is due to insufficient protection of values passed to a script that executes during device startup. An attacker could exploit this vulnerability by writing values to a specific file. A successful exploit could allow the attacker to execute commands with root privileges each time the affected device is restarted.
History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-09-24T18:02:13.753969Z

Updated: 2024-11-13T17:54:50.702Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3403

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.215Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:17.963

Modified: 2024-11-21T05:30:57.760

Link: CVE-2020-3403

cve-icon Redhat

No data.