A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software. The vulnerability is due to incomplete validation of certain commands. An attacker could exploit this vulnerability by first accessing the Guest Shell and then entering specific commands. A successful exploit could allow the attacker to execute arbitrary code on the base Linux operating system.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-dt | Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-dt | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-dt - Vendor Advisory |
Information
Published : 2019-09-25 21:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12666
Mitre link : CVE-2019-12666
CVE.ORG link : CVE-2019-12666
JSON object : View
Products Affected
cisco
- ios_xe
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')