First published: Wed Sep 27 2023(Updated: )
A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE | ||
Cisco Group Encrypted Transport VPN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-getvpn-rce-g8qR68sx is critical due to the potential for arbitrary code execution by an authenticated remote attacker.
Mitigation for cisco-sa-getvpn-rce-g8qR68sx involves applying the appropriate software updates provided by Cisco for affected IOS and IOS XE versions.
To exploit cisco-sa-getvpn-rce-g8qR68sx, the attacker must have administrative control of either a group member or a key server.
The impacted products of cisco-sa-getvpn-rce-g8qR68sx include Cisco IOS Software, Cisco IOS XE Software, and Cisco Group Encrypted Transport VPN.
Yes, cisco-sa-getvpn-rce-g8qR68sx can be remotely exploited by an authenticated attacker with the necessary administrative access.