Description
A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges.
Published: 2020-09-24
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-24675 A vulnerability in the persistent Telnet/Secure Shell (SSH) CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS) with root privileges. The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the persistent Telnet/SSH CLI on an affected device and requesting shell access. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS with root privileges.
History

Wed, 13 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco 1100-4g Integrated Services Router 1100-4gltegb Integrated Services Router 1100-4gltena Integrated Services Router 1100-4p Integrated Services Router 1100-6g Integrated Services Router 1100-8p Integrated Services Router 1100-lte Integrated Services Router 1100 Integrated Services Router 1101-4p Integrated Services Router 1101 Integrated Services Router 1109-2p Integrated Services Router 1109-4p Integrated Services Router 1109 Integrated Services Router 1111x-8p Integrated Services Router 1111x Integrated Services Router 111x Integrated Services Router 1120 Integrated Services Router 1160 Integrated Services Router 4221 Integrated Services Router 4331 Integrated Services Router 4431 Integrated Services Router 4451 Integrated Services Router 4461 Integrated Services Router Asr1001-hx Asr1001-hx-rf Asr1001-x-rf Asr1001-x-ws Asr1002-hx Asr1002-hx-rf Asr1002-hx-ws Asr1002-x-rf Asr1002-x-ws Asr 1000-x Asr 1001 Asr 1001-x Asr 1002 Asr 1002-x Asr 1004 Asr 1006 Asr 1013 Catalyst 9800-40 Catalyst 9800-80 Catalyst 9800-cl Catalyst 9800-l Catalyst 9800-l-c Catalyst 9800-l-f Catalyst C9200-24p Catalyst C9200-24t Catalyst C9200-48p Catalyst C9200-48t Catalyst C9200l-24p-4g Catalyst C9200l-24p-4x Catalyst C9200l-24pxg-2y Catalyst C9200l-24pxg-4x Catalyst C9200l-24t-4g Catalyst C9200l-24t-4x Catalyst C9200l-48p-4g Catalyst C9200l-48p-4x Catalyst C9200l-48pxg-2y Catalyst C9200l-48pxg-4x Catalyst C9200l-48t-4g Catalyst C9200l-48t-4x Catalyst C9300-24p Catalyst C9300-24s Catalyst C9300-24t Catalyst C9300-24u Catalyst C9300-24ux Catalyst C9300-48p Catalyst C9300-48s Catalyst C9300-48t Catalyst C9300-48u Catalyst C9300-48un Catalyst C9300-48uxm Catalyst C9300l-24p-4g Catalyst C9300l-24p-4x Catalyst C9300l-24t-4g Catalyst C9300l-24t-4x Catalyst C9300l-48p-4g Catalyst C9300l-48p-4x Catalyst C9300l-48t-4g Catalyst C9300l-48t-4x Catalyst C9404r Catalyst C9407r Catalyst C9410r Catalyst C9500-12q Catalyst C9500-16x Catalyst C9500-24q Catalyst C9500-24y4c Catalyst C9500-32c Catalyst C9500-32qc Catalyst C9500-40x Catalyst C9500-48y4c Csr 1000v Ios Xe Ws-c3650-12x48uq Ws-c3650-12x48ur Ws-c3650-12x48uz Ws-c3650-24pd Ws-c3650-24pdm Ws-c3650-24ps Ws-c3650-24td Ws-c3650-24ts Ws-c3650-48fd Ws-c3650-48fq Ws-c3650-48fqm Ws-c3650-48fs Ws-c3650-48pd Ws-c3650-48pq Ws-c3650-48ps Ws-c3650-48td Ws-c3650-48tq Ws-c3650-48ts Ws-c3650-8x24uq Ws-c3850 Ws-c3850-12s Ws-c3850-12x48u Ws-c3850-12xs Ws-c3850-24p Ws-c3850-24s Ws-c3850-24t Ws-c3850-24u Ws-c3850-24xs Ws-c3850-24xu Ws-c3850-48f Ws-c3850-48p Ws-c3850-48t Ws-c3850-48u Ws-c3850-48xs
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-13T17:54:59.540Z

Reserved: 2019-12-12T00:00:00.000Z

Link: CVE-2020-3404

cve-icon Vulnrichment

Updated: 2024-08-04T07:30:58.170Z

cve-icon NVD

Status : Modified

Published: 2020-09-24T18:15:18.073

Modified: 2024-11-21T05:30:57.877

Link: CVE-2020-3404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses