Security restrictions bypass in Cisco IOS/IOS XE



Published: 2018-02-08
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-0123
CWE-ID CWE-20
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Cisco IOS/IOS XE
Operating systems & Components / Operating system

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU10414

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0123

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass security restrictions and modify data on the target system.

The weakness exists in the diagnostic shell for Cisco IOS and IOS XE Software due to lack of proper input validation for certain diagnostic shell commands. A local attacker can authenticate to the device, enter the diagnostic shell, provide a specially crafted input to commands at the local diagnostic shell CLI and overwrite system files that should be restricted.

Mitigation

Update to version 16.8(0.99).

Vulnerable software versions

Cisco IOS/IOS XE: 16.7.1

CPE2.3 External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-ios


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###