Overview
- Description
- A vulnerability in a Virtualization Manager (VMAN) related CLI command of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on the affected device. An attacker who has administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges, which may lead to complete system compromise.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:15.3\\(3\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABE8D4E6-7906-4680-A1DF-71FF3D43716F" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.4\\(2\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21879090-79C9-4654-B0D4-7CC4DD92E367" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.4\\(3\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E142E50-BDDB-4F49-8270-CB7E2D3C815C" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.5\\(1\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "205E3D5E-35E1-4893-A5ED-A81E93C93319" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.5\\(2\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C0EF57-5858-4F02-97AA-C99D3F710765" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.5\\(3\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E64CE383-D9D5-45EF-9E68-E048D8DD9231" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.6\\(1\\)s:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A4A987C-C8E2-4193-9D92-9D97D4A1CE8C" } ], "operator": "OR" } ] } ]