First published: Wed Sep 25 2019(Updated: )
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.11.1 | |
Cisco IOS XE Web UI | =16.11.1-a | |
Cisco 4321/k9-rf Integrated Services Router | ||
Cisco 4321/k9-ws Integrated Services Router | ||
Cisco 4321 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4331/k9-ws Integrated Services Router | ||
Cisco 4331 Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4351/k9 Integrated Services Router | ||
Cisco 4351/k9 Integrated Services Router | ||
Cisco ASR 1001-HX | ||
Cisco ASR 1001-HX-RF | ||
Cisco ASR 1001-X | ||
Cisco ASR 1001-X | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-HX | ||
Cisco ASR 1002-X | ||
Cisco ASR 1002-X | ||
Cisco ASR 1002-X | ||
Cisco c1117-4p | ||
Cisco c1117-4p | ||
Cisco C1117-4P LTEA | ||
Cisco ENCS 5412/K9 | ||
Cisco ENCS 5412/K9 | ||
Cisco SASR 1000 Series Software Release 16.10 | ||
Cisco SASR 1K2XUC MK9 16.10 | ||
Cisco SASR 1000 Series Software Release 16.10 | ||
Cisco 1100 Series Integrated Services Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12671 is a vulnerability in the CLI of Cisco IOS XE Software that allows an authenticated local attacker to gain shell access on an affected device and execute commands on the underlying OS.
CVE-2019-12671 has a severity rating of 7.8 out of 10, indicating a high severity.
An attacker can exploit CVE-2019-12671 by leveraging insufficient enforcement of the consent token in authorizing shell access on the affected device.
Cisco IOS XE versions 16.11.1 and 16.11.1-a are affected by CVE-2019-12671.
To protect your device from CVE-2019-12671, Cisco recommends updating to a fixed software release as mentioned in the Cisco Security Advisory.