Impact
The vulnerability arises from an incorrect mapping of a command to task groups within Cisco IOS XR Software, classifying it as a privilege management flaw (CWE-264). An authenticated local attacker with a low‑privileged account can invoke a specific CLI command to bypass the task‑group based access checks and elevate their privileges to full administrative control. The impact is the ability for the attacker to execute any privileged operation that would normally require higher authorization, effectively compromising the confidentiality, integrity, and availability of the device. Based on the description, it is inferred that these core security properties are at risk because the attacker gains unrestricted control over the device.
Affected Systems
The affected product is Cisco IOS XR Software. Version information is not explicitly provided in the CVE entry; users should consult the linked Cisco advisory for details on which releases are impacted.
Risk and Exploitability
The issue carries a CVSS v3.1 score of 8.8, indicating high severity, while the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local authenticated access via the CLI, so an attacker must already possess some level of user presence on the device. Although the likelihood of exploitation is low, the high impact warrants careful assessment for critical environments where low‑privilege accounts exist.
OpenCVE Enrichment