First published: Thu Mar 23 2023(Updated: )
A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =17.7.1 | |
Cisco IOS XE | =17.8.1 | |
Cisco Catalyst 9200 | ||
Cisco Catalyst 9200cx | ||
Cisco Catalyst 9200l | ||
Cisco Catalyst 9300 | ||
Cisco Catalyst 9300-24p-a | ||
Cisco Catalyst 9300-24p-e | ||
Cisco Catalyst 9300-24s-a | ||
Cisco Catalyst 9300-24s-e | ||
Cisco Catalyst 9300-24t-a | ||
Cisco Catalyst 9300-24t-e | ||
Cisco Catalyst 9300-24u-a | ||
Cisco Catalyst 9300-24u-e | ||
Cisco Catalyst 9300-24ux-a | ||
Cisco Catalyst 9300-24ux-e | ||
Cisco Catalyst 9300-48p-a | ||
Cisco Catalyst 9300-48p-e | ||
Cisco Catalyst 9300-48s-a | ||
Cisco Catalyst 9300-48s-e | ||
Cisco Catalyst 9300-48t-a | ||
Cisco Catalyst 9300-48t-e | ||
Cisco Catalyst 9300-48u-a | ||
Cisco Catalyst 9300-48u-e | ||
Cisco Catalyst 9300-48un-a | ||
Cisco Catalyst 9300-48un-e | ||
Cisco Catalyst 9300-48uxm-a | ||
Cisco Catalyst 9300-48uxm-e | ||
Cisco Catalyst 9300l | ||
Cisco Catalyst 9300l-24p-4g-a | ||
Cisco Catalyst 9300l-24p-4g-e | ||
Cisco Catalyst 9300l-24p-4x-a | ||
Cisco Catalyst 9300l-24p-4x-e | ||
Cisco Catalyst 9300l-24t-4g-a | ||
Cisco Catalyst 9300l-24t-4g-e | ||
Cisco Catalyst 9300l-24t-4x-a | ||
Cisco Catalyst 9300l-24t-4x-e | ||
Cisco Catalyst 9300l-48p-4g-a | ||
Cisco Catalyst 9300l-48p-4g-e | ||
Cisco Catalyst 9300l-48p-4x-a | ||
Cisco Catalyst 9300l-48p-4x-e | ||
Cisco Catalyst 9300l-48t-4g-a | ||
Cisco Catalyst 9300l-48t-4g-e | ||
Cisco Catalyst 9300l-48t-4x-a | ||
Cisco Catalyst 9300l-48t-4x-e | ||
Cisco Catalyst 9300l Stack | ||
Cisco Catalyst 9300lm | ||
Cisco Catalyst 9300x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20029 is a vulnerability in the Meraki onboarding feature of Cisco IOS XE Software that allows an authenticated, local attacker to gain root level privileges on an affected device.
The severity of CVE-2023-20029 is high, with a CVSS score of 7.8.
Cisco IOS XE Software versions 17.7.1 and 17.8.1 are affected by CVE-2023-20029.
An attacker can exploit CVE-2023-20029 by taking advantage of insufficient memory protection in the Meraki onboarding feature of an affected device.
No, Cisco Catalyst 9200 is not vulnerable to CVE-2023-20029.