A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device.
This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
8011-4g24y4h-i
Subscribe
8101-32fh
Subscribe
8101-32fh-o
Subscribe
8101-32h-o
Subscribe
8102-28fh-dpu-o
Subscribe
8102-64h
Subscribe
8102-64h-o
Subscribe
8111-32eh-o
Subscribe
8122-64eh-o
Subscribe
8122-64ehf-o
Subscribe
8201
Subscribe
8201-24h8fh
Subscribe
8201-32fh
Subscribe
8201-32fh-o
Subscribe
8202
Subscribe
8202-32fh-m
Subscribe
8212-48fh-m
Subscribe
8404
Subscribe
8501-sys-mt
Subscribe
8608
Subscribe
8700
Subscribe
8711-32fh-m
Subscribe
8712-mod-m
Subscribe
8804
Subscribe
8808
Subscribe
8812
Subscribe
8818
Subscribe
Ios Xr
Subscribe
Ios Xr Software
Subscribe
Ios Xrd Control Plane
Subscribe
Ios Xrd Vrouter
Subscribe
Ncs 540-12z20g-sys-a
Subscribe
Ncs 540-12z20g-sys-d
Subscribe
Ncs 540-24q2c2dd-sys
Subscribe
Ncs 540-24q8l2dd-sys
Subscribe
Ncs 540-24z8q2c-sys
Subscribe
Ncs 540-28z4c-sys-a
Subscribe
Ncs 540-28z4c-sys-d
Subscribe
Ncs 540-6z14s-sys-d
Subscribe
Ncs 540-6z18g-sys-a
Subscribe
Ncs 540-6z18g-sys-d
Subscribe
Ncs 540-acc-sys
Subscribe
Ncs 540-fh-agg
Subscribe
Ncs 540-fh-csr-sys
Subscribe
Ncs 540x-12z16g-sys-a
Subscribe
Ncs 540x-12z16g-sys-d
Subscribe
Ncs 540x-16z4g8q2c-a
Subscribe
Ncs 540x-16z4g8q2c-d
Subscribe
Ncs 540x-16z8q2c-d
Subscribe
Ncs 540x-4z14g2q-a
Subscribe
Ncs 540x-4z14g2q-d
Subscribe
Ncs 540x-6z18g-sys-a
Subscribe
Ncs 540x-6z18g-sys-d
Subscribe
Ncs 540x-8z16g-sys-a
Subscribe
Ncs 540x-8z16g-sys-d
Subscribe
Ncs 540x-acc-sys
Subscribe
Ncs 57b1-5dse-sys
Subscribe
Ncs 57b1-6d24-sys
Subscribe
Ncs 57c1-48q6-sys
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-18035 | A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 05 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cisco 8011-4g24y4h-i
Cisco 8101-32fh Cisco 8101-32fh-o Cisco 8101-32h-o Cisco 8102-28fh-dpu-o Cisco 8102-64h Cisco 8102-64h-o Cisco 8111-32eh-o Cisco 8122-64eh-o Cisco 8122-64ehf-o Cisco 8201 Cisco 8201-24h8fh Cisco 8201-32fh Cisco 8201-32fh-o Cisco 8202 Cisco 8202-32fh-m Cisco 8212-48fh-m Cisco 8404 Cisco 8501-sys-mt Cisco 8608 Cisco 8700 Cisco 8711-32fh-m Cisco 8712-mod-m Cisco 8804 Cisco 8808 Cisco 8812 Cisco 8818 Cisco ios Xr Cisco ios Xrd Control Plane Cisco ios Xrd Vrouter Cisco ncs 540-12z20g-sys-a Cisco ncs 540-12z20g-sys-d Cisco ncs 540-24q2c2dd-sys Cisco ncs 540-24q8l2dd-sys Cisco ncs 540-24z8q2c-sys Cisco ncs 540-28z4c-sys-a Cisco ncs 540-28z4c-sys-d Cisco ncs 540-6z14s-sys-d Cisco ncs 540-6z18g-sys-a Cisco ncs 540-6z18g-sys-d Cisco ncs 540-acc-sys Cisco ncs 540-fh-agg Cisco ncs 540-fh-csr-sys Cisco ncs 540x-12z16g-sys-a Cisco ncs 540x-12z16g-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco ncs 540x-16z4g8q2c-d Cisco ncs 540x-16z8q2c-d Cisco ncs 540x-4z14g2q-a Cisco ncs 540x-4z14g2q-d Cisco ncs 540x-6z18g-sys-a Cisco ncs 540x-6z18g-sys-d Cisco ncs 540x-8z16g-sys-a Cisco ncs 540x-8z16g-sys-d Cisco ncs 540x-acc-sys Cisco ncs 57b1-5dse-sys Cisco ncs 57b1-6d24-sys Cisco ncs 57c1-48q6-sys |
|
| CPEs | cpe:2.3:a:cisco:ios_xrd_control_plane:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:ios_xrd_vrouter:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:8011-4g24y4h-i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8101-32h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-28fh-dpu-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8111-32eh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64eh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8122-64ehf-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-24h8fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh-o:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8212-48fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8404:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8501-sys-mt:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8700:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8711-32fh-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8712-mod-m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:* |
|
| Vendors & Products |
Cisco 8011-4g24y4h-i
Cisco 8101-32fh Cisco 8101-32fh-o Cisco 8101-32h-o Cisco 8102-28fh-dpu-o Cisco 8102-64h Cisco 8102-64h-o Cisco 8111-32eh-o Cisco 8122-64eh-o Cisco 8122-64ehf-o Cisco 8201 Cisco 8201-24h8fh Cisco 8201-32fh Cisco 8201-32fh-o Cisco 8202 Cisco 8202-32fh-m Cisco 8212-48fh-m Cisco 8404 Cisco 8501-sys-mt Cisco 8608 Cisco 8700 Cisco 8711-32fh-m Cisco 8712-mod-m Cisco 8804 Cisco 8808 Cisco 8812 Cisco 8818 Cisco ios Xr Cisco ios Xrd Control Plane Cisco ios Xrd Vrouter Cisco ncs 540-12z20g-sys-a Cisco ncs 540-12z20g-sys-d Cisco ncs 540-24q2c2dd-sys Cisco ncs 540-24q8l2dd-sys Cisco ncs 540-24z8q2c-sys Cisco ncs 540-28z4c-sys-a Cisco ncs 540-28z4c-sys-d Cisco ncs 540-6z14s-sys-d Cisco ncs 540-6z18g-sys-a Cisco ncs 540-6z18g-sys-d Cisco ncs 540-acc-sys Cisco ncs 540-fh-agg Cisco ncs 540-fh-csr-sys Cisco ncs 540x-12z16g-sys-a Cisco ncs 540x-12z16g-sys-d Cisco ncs 540x-16z4g8q2c-a Cisco ncs 540x-16z4g8q2c-d Cisco ncs 540x-16z8q2c-d Cisco ncs 540x-4z14g2q-a Cisco ncs 540x-4z14g2q-d Cisco ncs 540x-6z18g-sys-a Cisco ncs 540x-6z18g-sys-d Cisco ncs 540x-8z16g-sys-a Cisco ncs 540x-8z16g-sys-d Cisco ncs 540x-acc-sys Cisco ncs 57b1-5dse-sys Cisco ncs 57b1-6d24-sys Cisco ncs 57c1-48q6-sys |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-16T18:53:02.009Z
Reserved: 2023-11-08T15:08:07.632Z
Link: CVE-2024-20320
Updated: 2024-08-01T21:59:42.846Z
Status : Analyzed
Published: 2024-03-13T17:15:48.193
Modified: 2025-08-05T14:40:07.707
Link: CVE-2024-20320
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:15:43Z
Weaknesses
EUVD