CWE
22 20
Advisory Published
Updated

CVE-2018-0123: Path Traversal

First published: Thu Feb 08 2018(Updated: )

A Path Traversal vulnerability in the diagnostic shell for Cisco IOS and IOS XE Software could allow an authenticated, local attacker to use certain diagnostic shell commands that can overwrite system files. These system files may be sensitive and should not be able to be overwritten by a user of the diagnostic shell. The vulnerability is due to lack of proper input validation for certain diagnostic shell commands. An attacker could exploit this vulnerability by authenticating to the device, entering the diagnostic shell, and providing crafted user input to commands at the local diagnostic shell CLI. Successful exploitation could allow the attacker to overwrite system files that should be restricted. Cisco Bug IDs: CSCvg41950.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco IOS=16.7\(1\)
Cisco IOS XE Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-0123?

    CVE-2018-0123 is rated as a high-severity vulnerability due to its potential to allow unauthorized overwriting of sensitive system files.

  • How do I fix CVE-2018-0123?

    The fix for CVE-2018-0123 involves upgrading to a fixed version of Cisco IOS or IOS XE Software that addresses the vulnerability.

  • Who is affected by CVE-2018-0123?

    CVE-2018-0123 affects authenticated users of Cisco IOS and IOS XE Software versions that allow access to the diagnostic shell.

  • What can an attacker do with CVE-2018-0123?

    An authenticated local attacker can exploit CVE-2018-0123 to overwrite system files, which may lead to a loss of integrity and confidentiality.

  • Is CVE-2018-0123 easily exploitable?

    CVE-2018-0123 requires local access and authentication, making it less likely to be exploited by remote attackers, but it remains a critical risk for affected systems.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203