A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst 9200
Subscribe
Catalyst 9200cx
Subscribe
Catalyst 9200l
Subscribe
Catalyst 9300
Subscribe
Catalyst 9300-24p-a
Subscribe
Catalyst 9300-24p-e
Subscribe
Catalyst 9300-24s-a
Subscribe
Catalyst 9300-24s-e
Subscribe
Catalyst 9300-24t-a
Subscribe
Catalyst 9300-24t-e
Subscribe
Catalyst 9300-24u-a
Subscribe
Catalyst 9300-24u-e
Subscribe
Catalyst 9300-24ux-a
Subscribe
Catalyst 9300-24ux-e
Subscribe
Catalyst 9300-48p-a
Subscribe
Catalyst 9300-48p-e
Subscribe
Catalyst 9300-48s-a
Subscribe
Catalyst 9300-48s-e
Subscribe
Catalyst 9300-48t-a
Subscribe
Catalyst 9300-48t-e
Subscribe
Catalyst 9300-48u-a
Subscribe
Catalyst 9300-48u-e
Subscribe
Catalyst 9300-48un-a
Subscribe
Catalyst 9300-48un-e
Subscribe
Catalyst 9300-48uxm-a
Subscribe
Catalyst 9300-48uxm-e
Subscribe
Catalyst 9300l
Subscribe
Catalyst 9300l-24p-4g-a
Subscribe
Catalyst 9300l-24p-4g-e
Subscribe
Catalyst 9300l-24p-4x-a
Subscribe
Catalyst 9300l-24p-4x-e
Subscribe
Catalyst 9300l-24t-4g-a
Subscribe
Catalyst 9300l-24t-4g-e
Subscribe
Catalyst 9300l-24t-4x-a
Subscribe
Catalyst 9300l-24t-4x-e
Subscribe
Catalyst 9300l-48p-4g-a
Subscribe
Catalyst 9300l-48p-4g-e
Subscribe
Catalyst 9300l-48p-4x-a
Subscribe
Catalyst 9300l-48p-4x-e
Subscribe
Catalyst 9300l-48t-4g-a
Subscribe
Catalyst 9300l-48t-4g-e
Subscribe
Catalyst 9300l-48t-4x-a
Subscribe
Catalyst 9300l-48t-4x-e
Subscribe
Catalyst 9300l Stack
Subscribe
Catalyst 9300lm
Subscribe
Catalyst 9300x
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24208 | A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 25 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-25T16:03:04.973Z
Reserved: 2022-10-27T00:00:00
Link: CVE-2023-20029
Updated: 2024-08-02T08:57:35.877Z
Status : Modified
Published: 2023-03-23T17:15:13.940
Modified: 2024-11-21T07:40:23.523
Link: CVE-2023-20029
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD