Arbitrary code execution in Cisco IR800 Integrated Services Router



Published: 2017-09-07
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-12223
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Cisco IR800 Integrated Services Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Improper input validation

EUVDB-ID: #VU8155

Risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12223

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

vThe vulnerability allows a local unauthenticated attacker to execute arbitrary code on the target system.

The weakness exists in the ROM Monitor (ROMMON) code due to insufficient sanitization of user input. A local attacker who can access an affected router via the console can enter ROMMON mode and modify ROMMON variables to execute arbitrary code and install a malicious version of Hypervisor firmware.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

The vulnerability is addressed in the following versions: 15.7(3.1.4A)OT, 15.7(0.2)M, 15.6(3.0t)M, 15.6(3)M1.



Vulnerable software versions

Cisco IR800 Integrated Services Router: 15.6.1 T

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-isr


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###