Description
A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.
Published: 2023-03-23
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-24214 A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.
History

Mon, 28 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco 1100-4g\/6g Integrated Services Router 1100-4p Integrated Services Router 1100-8p Integrated Services Router 1100 Integrated Services Router 1101-4p Integrated Services Router 1101 Integrated Services Router 1109-2p Integrated Services Router 1109-4p Integrated Services Router 1109 Integrated Services Router 1120 Integrated Services Router 1131 Integrated Services Router 1160 Integrated Services Router 4221 Integrated Services Router 4321 Integrated Services Router 4331 Integrated Services Router 4351 Integrated Services Router 4431 Integrated Services Router 4451-x Integrated Services Router 4451 Integrated Services Router 4461 Integrated Services Router Asr 1001-x Asr 1002-hx Asr 1006-x Asr 1009-x Catalyst 8000v Edge Catalyst 8200 Catalyst 8300 Catalyst 8300-1n1s-4t2x Catalyst 8300-1n1s-6t Catalyst 8300-2n2s-4t2x Catalyst 8300-2n2s-6t Catalyst 8500 Catalyst 8500-4qc Catalyst 8500l Catalyst 8510csr Catalyst 8510msr Catalyst 8540csr Catalyst 8540msr Csr 1000v Ios Xe Sd-wan
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-28T16:32:57.941Z

Reserved: 2022-10-27T00:00:00.000Z

Link: CVE-2023-20035

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.562Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T17:15:14.030

Modified: 2024-11-21T07:40:24.403

Link: CVE-2023-20035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses