Description
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.

This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by using the CLI command to bypass the task group–based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on an affected device without authorization checks.
Published: 2026-03-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from an incorrect mapping of a command to task groups within Cisco IOS XR Software, classifying it as a privilege management flaw (CWE-264). An authenticated local attacker with a low‑privileged account can invoke a specific CLI command to bypass the task‑group based access checks and elevate their privileges to full administrative control. The impact is the ability for the attacker to execute any privileged operation that would normally require higher authorization, effectively compromising the confidentiality, integrity, and availability of the device. Based on the description, it is inferred that these core security properties are at risk because the attacker gains unrestricted control over the device.

Affected Systems

The affected product is Cisco IOS XR Software. Version information is not explicitly provided in the CVE entry; users should consult the linked Cisco advisory for details on which releases are impacted.

Risk and Exploitability

The issue carries a CVSS v3.1 score of 8.8, indicating high severity, while the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local authenticated access via the CLI, so an attacker must already possess some level of user presence on the device. Although the likelihood of exploitation is low, the high impact warrants careful assessment for critical environments where low‑privilege accounts exist.

Generated by OpenCVE AI on March 17, 2026 at 15:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Cisco IOS XR Software patch that addresses this privilege escalation issue, as detailed in the Cisco security advisory linked above.
  • If a patch cannot be applied immediately, restrict the vulnerable CLI command so that it is executable only by privileged or administrative accounts, or disable the command for low‑privilege users.
  • Monitor device logs for unauthorized or suspicious use of privileged commands and investigate any anomalies.
  • Contact Cisco support for additional guidance or to confirm that the device has been fully secured.

Generated by OpenCVE AI on March 17, 2026 at 15:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco ios Xr Software
Vendors & Products Cisco
Cisco ios Xr Software

Wed, 11 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device. This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by using the CLI command to bypass the task group&ndash;based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on an affected device without authorization checks.
Title Cisco IOS XR Software CLI Privilege Escalation Vulnerability
Weaknesses CWE-264
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Cisco Ios Xr Software
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-03-12T03:55:36.546Z

Reserved: 2025-10-08T11:59:15.354Z

Link: CVE-2026-20046

cve-icon Vulnrichment

Updated: 2026-03-11T17:14:22.897Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T17:16:55.230

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-20046

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:30:30Z

Weaknesses