First published: Wed Mar 27 2019(Updated: )
A vulnerability in the web UI framework of Cisco IOS XE Software could allow an authenticated, remote attacker to make unauthorized changes to the filesystem of the affected device. The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by crafting a malicious file and uploading it to the device. An exploit could allow the attacker to gain elevated privileges on the affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =16.2.1 | |
Cisco IOS XE | =16.2.2 | |
Cisco IOS XE | =16.3.1 | |
Cisco IOS XE | =16.3.1a | |
Cisco IOS XE | =16.3.2 | |
Cisco IOS XE | =16.3.3 | |
Cisco IOS XE | =16.3.4 | |
Cisco IOS XE | =16.3.5 | |
Cisco IOS XE | =16.3.5b | |
Cisco IOS XE | =16.3.6 | |
Cisco IOS XE | =16.4.1 | |
Cisco IOS XE | =16.4.2 | |
Cisco IOS XE | =16.4.3 | |
Cisco IOS XE | =16.5.1 | |
Cisco IOS XE | =16.5.1a | |
Cisco IOS XE | =16.5.1b | |
Cisco IOS XE | =16.5.2 | |
Cisco IOS XE | =16.5.3 | |
Cisco IOS XE | =16.6.1 | |
Cisco IOS XE | =16.6.2 | |
Cisco IOS XE | =16.6.3 | |
Cisco IOS XE | =16.7.1 | |
Cisco IOS XE | =16.7.1a | |
Cisco IOS XE | =16.7.1b | |
Cisco IOS XE | =16.8.1 | |
Cisco IOS XE | =16.8.1a | |
Cisco IOS XE | =16.8.1b | |
Cisco IOS XE | =16.8.1c | |
Cisco IOS XE | =16.8.1d | |
Cisco IOS XE | =16.8.1e | |
Cisco IOS XE | =16.8.1s | |
=16.2.1 | ||
=16.2.2 | ||
=16.3.1 | ||
=16.3.1a | ||
=16.3.2 | ||
=16.3.3 | ||
=16.3.4 | ||
=16.3.5 | ||
=16.3.5b | ||
=16.3.6 | ||
=16.4.1 | ||
=16.4.2 | ||
=16.4.3 | ||
=16.5.1 | ||
=16.5.1a | ||
=16.5.1b | ||
=16.5.2 | ||
=16.5.3 | ||
=16.6.1 | ||
=16.6.2 | ||
=16.6.3 | ||
=16.7.1 | ||
=16.7.1a | ||
=16.7.1b | ||
=16.8.1 | ||
=16.8.1a | ||
=16.8.1b | ||
=16.8.1c | ||
=16.8.1d | ||
=16.8.1e | ||
=16.8.1s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.