First published: Wed Sep 25 2019(Updated: )
A vulnerability in a CLI command related to the virtualization manager (VMAN) in Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on an affected device. An attacker who has valid administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to run arbitrary commands on the underlying operating system with root privileges, which may lead to complete system compromise. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-xr-asr9k-privesc
Credit: This vulnerability was found by Eugenio Iavarone Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190925-xr-asr9k-privesc is considered high due to the potential for local authenticated attackers to execute arbitrary commands with root privileges.
To fix cisco-sa-20190925-xr-asr9k-privesc, apply the recommended security updates from Cisco for IOS XR Software.
The cisco-sa-20190925-xr-asr9k-privesc vulnerability affects devices running Cisco IOS XR Software on the ASR 9000 Series routers.
cisco-sa-20190925-xr-asr9k-privesc exploits a vulnerability in a CLI command related to the virtualization manager (VMAN).
No, the cisco-sa-20190925-xr-asr9k-privesc vulnerability can only be exploited by an authenticated local attacker.