First published: Wed Sep 25 2019(Updated: )
A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker who has valid administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to run arbitrary commands on the underlying operating system with root privileges, which may lead to complete system compromise.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | >=5.1.0<6.5.3 | |
Cisco IOS XR | >=6.6.0<6.6.2 | |
Cisco Asr 9000v | ||
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9901 | ||
Cisco Asr 9904 | ||
Cisco Asr 9906 | ||
Cisco Asr 9910 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12709 is a vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers.
CVE-2019-12709 allows an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges.
CVE-2019-12709 has a severity score of 6.7 (high).
Cisco IOS XR Software versions between 5.1.0 and 6.5.3, and versions between 6.6.0 and 6.6.2 are affected by CVE-2019-12709.
To fix CVE-2019-12709, Cisco IOS XR Software users should apply the necessary updates provided by Cisco.