First published: Wed Sep 25 2019(Updated: )
A vulnerability in the Guest Shell of Cisco IOS XE Software could allow an authenticated, local attacker to perform directory traversal on the base Linux operating system of Cisco IOS XE Software. The vulnerability is due to incomplete validation of certain commands. An attacker could exploit this vulnerability by first accessing the Guest Shell and then entering specific commands. A successful exploit could allow the attacker to execute arbitrary code on the base Linux operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | >=16.4<16.6.5 | |
Cisco IOS XE Web UI | >=16.7<16.9.3 | |
Cisco IOS XE Web UI | =16.11.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12666 is rated as a medium severity vulnerability due to its potential for unauthorized access on affected systems.
To fix CVE-2019-12666, update your Cisco IOS XE software to a version that is not affected by this vulnerability, such as versions above 16.6.5, 16.9.3, or the fixed version 16.11.1.
CVE-2019-12666 affects Cisco IOS XE Software versions ranging from 16.4 to 16.6.5, 16.7 to 16.9.3, and specifically version 16.11.1.
Exploiting CVE-2019-12666 could allow an authenticated local attacker to perform directory traversal, potentially accessing sensitive data on the base Linux operating system.
Yes, CVE-2019-12666 requires an attacker to be authenticated locally in order to exploit the directory traversal vulnerability.