First published: Wed Mar 13 2024(Updated: )
A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | ||
Cisco 8000 Series Routers | ||
Cisco Network Convergence System 540 Series | ||
Cisco Network Convergence System (NCS) 5700 Series Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20320 has a high severity rating due to its potential for privilege escalation by authenticated local attackers.
To remediate CVE-2024-20320, upgrade to the latest version of Cisco IOS XR Software or apply the available patches provided by Cisco.
CVE-2024-20320 affects Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 and 5700 Series Routers running vulnerable versions of IOS XR Software.
CVE-2024-20320 can be exploited by an authenticated, local attacker seeking to elevate their privileges on the affected devices.
CVE-2024-20320 was disclosed as part of a security advisory by Cisco related to vulnerabilities in their networking products.