A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-sABD8hcU | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-03-23 17:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-20029
Mitre link : CVE-2023-20029
CVE.ORG link : CVE-2023-20029
JSON object : View
Products Affected
cisco
- catalyst_9300-24u-a
- catalyst_9200
- catalyst_9300-48s-e
- catalyst_9300-48p-e
- catalyst_9300-48u-a
- catalyst_9300-48u-e
- catalyst_9300-48t-a
- catalyst_9300l-24t-4x-a
- catalyst_9300-24s-e
- catalyst_9300l-48p-4g-e
- catalyst_9300l-48p-4x-a
- catalyst_9300l-48p-4g-a
- catalyst_9300-24ux-a
- catalyst_9300-24u-e
- catalyst_9300-24s-a
- ios_xe
- catalyst_9300l-24p-4x-e
- catalyst_9300l-48t-4g-a
- catalyst_9300l-48t-4g-e
- catalyst_9300l-48t-4x-a
- catalyst_9300l-24t-4x-e
- catalyst_9300l-24p-4g-a
- catalyst_9300l-48t-4x-e
- catalyst_9300-48uxm-a
- catalyst_9300-48t-e
- catalyst_9300-48un-e
- catalyst_9300-24t-e
- catalyst_9300-24ux-e
- catalyst_9300-48s-a
- catalyst_9300l-24t-4g-e
- catalyst_9200l
- catalyst_9300l-48p-4x-e
- catalyst_9300
- catalyst_9300l
- catalyst_9200cx
- catalyst_9300-48p-a
- catalyst_9300-48un-a
- catalyst_9300l-24p-4g-e
- catalyst_9300-24p-e
- catalyst_9300x
- catalyst_9300-24p-a
- catalyst_9300-48uxm-e
- catalyst_9300l-24p-4x-a
- catalyst_9300lm
- catalyst_9300l_stack
- catalyst_9300-24t-a
- catalyst_9300l-24t-4g-a
CWE