Impact
The vulnerability lies in the bootloader of Cisco IOS XE Software on certain Cisco Catalyst and Rugged Series Switches. The bootloader performs integrity checks on the firmware image it loads, but these checks are insufficiently validated. An attacker with either level‑15 local privileges or any physical access can modify the binaries read during boot, causing the device to execute malicious code and bypass the requirement that only Cisco‑signed images run, effectively breaking the secure boot chain of trust.
Affected Systems
Affected systems include Cisco Catalyst 9200 Series Switches, Cisco Catalyst ESS9300 Embedded Series Switches, Cisco Catalyst IE9310 and IE9320 Rugged Series Switches, and Cisco IE3500 and IE3505 Rugged Series Switches. All run Cisco IOS XE Software; specific affected firmware versions are not disclosed in the advisory.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate to high severity, yet the EPSS score is below 1%, suggesting a low current exploitation probability. Nonetheless, because the flaw allows arbitrary code execution at boot and can be triggered with physical possession or administrative credentials, it represents a serious risk. The vulnerability is not listed in the CISA KEV catalog, but the security advisory assigns it a high impact rating due to the loss of secure boot.
OpenCVE Enrichment