CVE-2024-20278

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.
Configurations

No configuration.

History

21 Nov 2024, 08:52

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-seAx6NLX -
Summary
  • (es) Una vulnerabilidad en la función NETCONF del software Cisco IOS XE podría permitir que un atacante remoto autenticado eleve los privilegios a root en un dispositivo afectado. Esta vulnerabilidad se debe a una validación inadecuada de la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando información manipulada a través de NETCONF a un dispositivo afectado. Un exploit exitoso podría permitir al atacante elevar los privilegios de Administrador a Root.

27 Mar 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-27 17:15

Updated : 2024-11-21 08:52


NVD link : CVE-2024-20278

Mitre link : CVE-2024-20278

CVE.ORG link : CVE-2024-20278


JSON object : View

Products Affected

No product.

CWE
CWE-184

Incomplete List of Disallowed Inputs