First published: Wed Sep 25 2019(Updated: )
A vulnerability in the filesystem of Cisco IOS XE Software could allow an authenticated, local attacker within the IOx Guest Shell to modify the namespace container protections on an affected device. The vulnerability is due to insufficient file permissions. An attacker could exploit this vulnerability by modifying files that they should not have access to. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS | =16.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12670 has been assigned a medium severity rating due to its potential impact on file permissions.
To mitigate CVE-2019-12670, ensure that your Cisco IOS XE Software is updated to a version that addresses this vulnerability.
CVE-2019-12670 affects devices running Cisco IOS XE version 16.10.1 that utilize the IOx Guest Shell.
An authenticated, local attacker within the IOx Guest Shell environment could exploit CVE-2019-12670.
CVE-2019-12670 could allow an attacker to modify the namespace container protections on the affected device.