First published: Wed Sep 11 2024(Updated: )
Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root. These vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands. An attacker could exploit these vulnerabilities by including crafted input as the argument of an affected configuration command. A successful exploit could allow the attacker to execute arbitrary commands as root on the PON controller.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =24.1.1 | |
Cisco IOS XRv 9000 | =24.1.2 | |
Cisco IOS XRv 9000 | =24.2.1 | |
Cisco IOS XRv 9000 | =24.2.11 | |
Cisco IOS XRv 9000 | =24.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20483 has been classified with a high severity rating, indicating a significant risk to affected systems.
To remediate CVE-2024-20483, upgrade to the latest patched version of Cisco IOS XR that addresses the vulnerabilities.
CVE-2024-20483 affects Cisco IOS XR versions 24.1.1, 24.1.2, 24.2.1, 24.2.11, and 24.3.1.
Yes, CVE-2024-20483 can be exploited by an authenticated remote attacker with Administrator-level privileges.
CVE-2024-20483 could allow an attacker to execute unauthorized actions on the Cisco Routed PON Controller Software.