First published: Fri Oct 05 2018(Updated: )
A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.5\(2.21\)t | |
Cisco IOS | =15.6\(3\)m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15375 is classified as a high severity vulnerability.
To mitigate CVE-2018-15375, upgrade to a patched version of Cisco IOS Software.
CVE-2018-15375 affects Cisco 800 Series Industrial Integrated Services Routers running specific versions of Cisco IOS Software.
An authenticated local attacker can write arbitrary values to arbitrary memory locations on the affected device.
CVE-2018-15375 is not remotely exploitable as it requires local authenticated access to the device.