First published: Wed Sep 13 2023(Updated: )
A vulnerability in Cisco IOS XR Software image verification checks could allow an authenticated, local attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to a time-of-check, time-of-use (TOCTOU) race condition when an install query regarding an ISO image is performed during an install operation that uses an ISO image. An attacker could exploit this vulnerability by modifying an ISO image and then carrying out install requests in parallel. A successful exploit could allow the attacker to execute arbitrary code on an affected device.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | >=7.5.2<7.6 | |
Cisco IOS XR | >=7.7<7.10.1 | |
Cisco IOS XR | >=7.5.2<7.6 | |
Cisco IOS XR | >=7.7<7.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20135.
The vulnerability affects Cisco IOS XR Software versions 7.5.2 to 7.6 and versions 7.7 to 7.10.1.
The severity of CVE-2023-20135 is high (CVSS score 7).
An authenticated, local attacker can exploit this vulnerability to execute arbitrary code on the underlying operating system.
Yes, Cisco has provided a security advisory with information on how to mitigate this vulnerability.