Vulnerability identifier: #VU8155
Vulnerability risk: Low
CVSSv3.1: 6.2 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Cisco IR800 Integrated Services Router
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
vThe vulnerability allows a local unauthenticated attacker to execute arbitrary code on the target system.
The weakness exists in the ROM Monitor (ROMMON) code due to insufficient sanitization of user input. A local attacker who can access an affected router via the console can enter ROMMON mode and modify ROMMON variables to execute arbitrary code and install a malicious version of Hypervisor firmware.
Successful exploitation of the vulnerability may result in system compromise.
Mitigation
The vulnerability is addressed in the following versions: 15.7(3.1.4A)OT, 15.7(0.2)M, 15.6(3.0t)M, 15.6(3)M1.
Vulnerable software versions
Cisco IR800 Integrated Services Router: 15.6.1 T
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-isr
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.