First published: Fri Oct 05 2018(Updated: )
A vulnerability in the embedded test subsystem of Cisco IOS Software for Cisco 800 Series Industrial Integrated Services Routers could allow an authenticated, local attacker to write arbitrary values to arbitrary locations in the memory space of an affected device. The vulnerability is due to the presence of certain test commands that were intended to be available only in internal development builds of the affected software. An attacker could exploit this vulnerability by using these commands on an affected device. A successful exploit could allow the attacker to write arbitrary values to arbitrary locations in the memory space of the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.5\(2.21\)t | |
Cisco IOS | =15.6\(3\)m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15376 is considered to have a high severity as it allows an authenticated attacker to write arbitrary values to the memory of affected Cisco IOS devices.
To fix CVE-2018-15376, update your Cisco IOS software to the latest version that addresses this vulnerability.
CVE-2018-15376 affects Cisco 800 Series Industrial Integrated Services Routers running specific versions of Cisco IOS Software.
An authenticated, local attacker is required to exploit CVE-2018-15376 to affect the device.
If exploited, CVE-2018-15376 could allow an attacker to modify critical memory locations, potentially leading to system instability or unauthorized access.