First published: Wed Jun 03 2020(Updated: )
A vulnerability in Role Based Access Control (RBAC) functionality of Cisco IOS XE Web Management Software could allow a Read-Only authenticated, remote attacker to execute commands or configuration changes as an Admin user. The vulnerability is due to incorrect handling of RBAC for the administration GUI. An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a Read-Only user to execute CLI commands or configuration changes as if they were an Admin user.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =16.2.2 | |
Cisco IOS XE | =16.3.1 | |
Cisco IOS XE | =16.3.1a | |
Cisco IOS XE | =16.3.2 | |
Cisco IOS XE | =16.3.3 | |
Cisco IOS XE | =16.3.4 | |
Cisco IOS XE | =16.3.5 | |
Cisco IOS XE | =16.3.5b | |
Cisco IOS XE | =16.3.6 | |
Cisco IOS XE | =16.3.7 | |
Cisco IOS XE | =16.3.8 | |
Cisco IOS XE | =16.3.9 | |
Cisco IOS XE | =16.3.10 | |
Cisco IOS XE | =16.4.1 | |
Cisco IOS XE | =16.4.2 | |
Cisco IOS XE | =16.4.3 | |
Cisco IOS XE | =16.5.1 | |
Cisco IOS XE | =16.5.1a | |
Cisco IOS XE | =16.5.1b | |
Cisco IOS XE | =16.5.2 | |
Cisco IOS XE | =16.5.3 | |
Cisco IOS XE | =16.6.1 | |
Cisco IOS XE | =16.6.2 | |
Cisco IOS XE | =16.6.3 | |
Cisco IOS XE | =16.6.4 | |
Cisco IOS XE | =16.6.4a | |
Cisco IOS XE | =16.6.4s | |
Cisco IOS XE | =16.6.5 | |
Cisco IOS XE | =16.6.5a | |
Cisco IOS XE | =16.6.5b | |
Cisco IOS XE | =16.6.6 | |
Cisco IOS XE | =16.6.7 | |
Cisco IOS XE | =16.6.7a | |
Cisco IOS XE | =16.6.8 | |
Cisco IOS XE | =16.7.1 | |
Cisco IOS XE | =16.7.1a | |
Cisco IOS XE | =16.7.1b | |
Cisco IOS XE | =16.7.2 | |
Cisco IOS XE | =16.7.3 | |
Cisco IOS XE | =16.7.4 | |
Cisco IOS XE | =16.8.1 | |
Cisco IOS XE | =16.8.1a | |
Cisco IOS XE | =16.8.1b | |
Cisco IOS XE | =16.8.1c | |
Cisco IOS XE | =16.8.1d | |
Cisco IOS XE | =16.8.1e | |
Cisco IOS XE | =16.8.1s | |
Cisco IOS XE | =16.8.2 | |
Cisco IOS XE | =16.8.3 | |
Cisco IOS XE | =16.9.1 | |
Cisco IOS XE | =16.9.1a | |
Cisco IOS XE | =16.9.1b | |
Cisco IOS XE | =16.9.1c | |
Cisco IOS XE | =16.9.1d | |
Cisco IOS XE | =16.9.1s | |
Cisco IOS XE | =16.9.2 | |
Cisco IOS XE | =16.9.2a | |
Cisco IOS XE | =16.9.2s | |
Cisco IOS XE | =16.9.3 | |
Cisco IOS XE | =16.9.3a | |
Cisco IOS XE | =16.9.3h | |
Cisco IOS XE | =16.9.3s | |
Cisco IOS XE | =16.9.4 | |
Cisco IOS XE | =16.9.4c | |
Cisco IOS XE | =16.9.5 | |
Cisco IOS XE | =16.9.5f | |
Cisco IOS XE | =16.10.1 | |
Cisco IOS XE | =16.10.1a | |
Cisco IOS XE | =16.10.1b | |
Cisco IOS XE | =16.10.1c | |
Cisco IOS XE | =16.10.1d | |
Cisco IOS XE | =16.10.1e | |
Cisco IOS XE | =16.10.1f | |
Cisco IOS XE | =16.10.1g | |
Cisco IOS XE | =16.10.1s | |
Cisco IOS XE | =16.10.2 | |
Cisco IOS XE | =16.10.3 | |
Cisco IOS XE | =16.11.1 | |
Cisco IOS XE | =16.11.1a | |
Cisco IOS XE | =16.11.1b | |
Cisco IOS XE | =16.11.1c | |
Cisco IOS XE | =16.11.1s | |
Cisco IOS XE | =16.12.1y |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3229 is rated as high severity due to its impact on Role Based Access Control (RBAC).
To fix CVE-2020-3229, apply the latest software updates released by Cisco for affected versions of IOS XE.
CVE-2020-3229 affects multiple Cisco IOS XE versions including 16.2.2 and 16.3.x up to 16.12.1y.
Yes, a remote, authenticated attacker can exploit CVE-2020-3229 to execute commands or make configuration changes as an Admin user.
Yes, the attacker must have authenticated read-only access to exploit CVE-2020-3229.