First published: Fri Oct 05 2018(Updated: )
A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability exist because the affected software improperly sanitizes command arguments, failing to prevent access to certain internal data structures on an affected device. An attacker who has privileged EXEC mode (privilege level 15) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain custom arguments. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =15.3\(3\)s3.16 | |
Cisco IOS XE Web UI | =16.7\(1\) | |
Cisco IOS XE Web UI | =16.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0481 has been assigned a high severity rating due to the potential for local attackers to execute unauthorized commands with root privileges.
To mitigate CVE-2018-0481, upgrade your Cisco IOS XE software to a version that contains the necessary patches, such as 15.3(3)S3.17 or 16.7.2.
CVE-2018-0481 allows an authenticated local attacker to execute commands on the underlying Linux shell, potentially compromising the device's integrity.
CVE-2018-0481 affects Cisco IOS XE versions 15.3(3)S3.16, 16.7(1), and 16.7.1.
No, CVE-2018-0481 requires local authentication for exploitation, meaning a remote attacker cannot exploit this vulnerability without local access.