First published: Thu Jan 18 2018(Updated: )
A vulnerability in one of the diagnostic test CLI commands on Cisco Industrial Ethernet 4010 Series Switches running Cisco IOS Software could allow an authenticated, local attacker to impact the stability of the device. This could result in arbitrary code execution or a denial of service (DoS) condition. The attacker has to have valid user credentials at privilege level 15. The vulnerability is due to a diagnostic test CLI command that allows the attacker to write to the device memory. An attacker could exploit this vulnerability by authenticating to the targeted device and issuing a specific diagnostic test command at the CLI. An exploit could allow the attacker to overwrite system memory locations, which could have a negative impact on the stability of the device. Cisco Bug IDs: CSCvf71150.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Industrial Ethernet 4010 Series Firmware | ||
Cisco IE-4010-16S12P Industrial Ethernet Switch | ||
Cisco IE-4010-4S24P |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0088 has a severity rating that indicates potential for stability impacts and possible arbitrary code execution.
To mitigate CVE-2018-0088, update to the latest version of the affected Cisco Industrial Ethernet 4010 Series Firmware.
CVE-2018-0088 affects devices running vulnerable versions of Cisco IOS Software on Cisco Industrial Ethernet 4010 Series Switches.
An authenticated, local attacker could exploit CVE-2018-0088 to cause denial of service or arbitrary code execution.
Exploitation of CVE-2018-0088 requires local access and authentication to the affected device, which may limit its attack surface.