First published: Wed Jul 10 2024(Updated: )
A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Cisco Secure Boot functionality and load unverified software on an affected device. To exploit this successfully, the attacker must have root-system privileges on the affected device. This vulnerability is due to an error in the software build process. An attacker could exploit this vulnerability by manipulating the system’s configuration options to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass of the requirement to run Cisco signed images or alter the security properties of the running system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20456 is classified as a high-severity vulnerability affecting Cisco IOS XR Software.
To mitigate CVE-2024-20456, ensure that your Cisco IOS XR Software is updated to the latest version provided by Cisco.
No, CVE-2024-20456 requires local access and high privileges to be exploited.
CVE-2024-20456 allows an authenticated attacker to bypass Secure Boot and load unverified software, risking the integrity of the device.
CVE-2024-20456 specifically affects Cisco IOS XR Software.