First published: Thu Feb 08 2018(Updated: )
A Path Traversal vulnerability in the diagnostic shell for Cisco IOS and IOS XE Software could allow an authenticated, local attacker to use certain diagnostic shell commands that can overwrite system files. These system files may be sensitive and should not be able to be overwritten by a user of the diagnostic shell. The vulnerability is due to lack of proper input validation for certain diagnostic shell commands. An attacker could exploit this vulnerability by authenticating to the device, entering the diagnostic shell, and providing crafted user input to commands at the local diagnostic shell CLI. Successful exploitation could allow the attacker to overwrite system files that should be restricted. Cisco Bug IDs: CSCvg41950.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =16.7\(1\) | |
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0123 is rated as a high-severity vulnerability due to its potential to allow unauthorized overwriting of sensitive system files.
The fix for CVE-2018-0123 involves upgrading to a fixed version of Cisco IOS or IOS XE Software that addresses the vulnerability.
CVE-2018-0123 affects authenticated users of Cisco IOS and IOS XE Software versions that allow access to the diagnostic shell.
An authenticated local attacker can exploit CVE-2018-0123 to overwrite system files, which may lead to a loss of integrity and confidentiality.
CVE-2018-0123 requires local access and authentication, making it less likely to be exploited by remote attackers, but it remains a critical risk for affected systems.