First published: Thu Sep 07 2017(Updated: )
A vulnerability in the ROM Monitor (ROMMON) code of Cisco IR800 Integrated Services Router Software could allow an unauthenticated, local attacker to boot an unsigned Hypervisor on an affected device and compromise the integrity of the system. The vulnerability is due to insufficient sanitization of user input. An attacker who can access an affected router via the console could exploit this vulnerability by entering ROMMON mode and modifying ROMMON variables. A successful exploit could allow the attacker to execute arbitrary code and install a malicious version of Hypervisor firmware on an affected device. Cisco Bug IDs: CSCvb44027.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IR800 Integrated Services Router firmware | ||
Cisco 800M Integrated Services Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12223 is classified as high severity due to its potential to allow unauthorized access to system integrity.
To fix CVE-2017-12223, update the affected Cisco IR800 Integrated Services Router firmware to the latest patched version.
CVE-2017-12223 is caused by insufficient sanitization of inputs in the ROM Monitor code.
CVE-2017-12223 affects devices running the Cisco IR800 Integrated Services Router firmware.
CVE-2017-12223 is not remotely exploitable; it requires local access to the affected device.