#VU8155 Improper input validation in Cisco IR800 Integrated Services Router


Published: 2017-09-07

Vulnerability identifier: #VU8155

Vulnerability risk: Low

CVSSv3.1: 6.2 [CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-12223

CWE-ID: CWE-20

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Cisco IR800 Integrated Services Router
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Cisco Systems, Inc

Description
vThe vulnerability allows a local unauthenticated attacker to execute arbitrary code on the target system.

The weakness exists in the ROM Monitor (ROMMON) code due to insufficient sanitization of user input. A local attacker who can access an affected router via the console can enter ROMMON mode and modify ROMMON variables to execute arbitrary code and install a malicious version of Hypervisor firmware.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation
The vulnerability is addressed in the following versions: 15.7(3.1.4A)OT, 15.7(0.2)M, 15.6(3.0t)M, 15.6(3)M1.



Vulnerable software versions

Cisco IR800 Integrated Services Router: 15.6.1 T


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-isr


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability