A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to execute persistent code at boot time and break the chain of trust. This vulnerability is due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit this vulnerability by installing code to a specific directory in the underlying operating system (OS) and setting a specific ROMMON variable. A successful exploit could allow the attacker to execute persistent code on the underlying OS. To exploit this vulnerability, the attacker would need access to the root shell on the device or have physical access to the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS | Vendor Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:31
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 6.8 |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS - Vendor Advisory |
Information
Published : 2020-09-24 18:15
Updated : 2024-11-21 05:31
NVD link : CVE-2020-3417
Mitre link : CVE-2020-3417
CVE.ORG link : CVE-2020-3417
JSON object : View
Products Affected
cisco
- ios_xe
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')