First published: Wed Mar 28 2018(Updated: )
Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerabilities are due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has user EXEC mode (privilege level 1) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCtw85441, CSCus42252, CSCuv95370.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =15.0\(5.59\)emd | |
Cisco IOS XE Software | =16.1\(0\) | |
Cisco IOS XE Software | =16.2\(0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0176 is rated as a high severity vulnerability due to its potential to allow local attackers to execute arbitrary commands with root privileges.
To mitigate CVE-2018-0176, upgrade the affected Cisco IOS XE Software to a release that addresses the vulnerabilities.
CVE-2018-0176 affects devices running specific versions of Cisco IOS XE Software, including 15.0(5.59)emd, 16.1(0), and 16.2(0).
No, CVE-2018-0176 requires an authenticated, local attacker to exploit the vulnerability.
Exploiting CVE-2018-0176 could allow an attacker to access the underlying Linux shell and execute arbitrary commands on the affected device.