First published: Fri Oct 05 2018(Updated: )
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain custom arguments. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.3\(3\)s3.16 | |
Cisco IOS XE Web UI | =16.7\(1\) | |
Cisco IOS XE Web UI | =16.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0477 is classified as a high-severity vulnerability due to its potential to allow an authenticated attacker to execute commands with root privileges.
To fix CVE-2018-0477, upgrade to a fixed version of Cisco IOS XE Software that addresses this vulnerability.
CVE-2018-0477 affects specific versions of Cisco IOS XE, including 15.3(3)s3.16 and 16.7(1) or 16.7.1.
CVE-2018-0477 can be exploited by authenticated, local attackers with access to the device.
CVE-2018-0477 enables authenticated attackers to execute arbitrary commands on the underlying Linux shell, potentially leading to a full system compromise.