First published: Wed Mar 22 2023(Updated: )
A vulnerability in the Cloud Management for Catalyst migration feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root-level privileges on an affected device.This vulnerability is due to insufficient memory protection in the Cisco IOS XE
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability cisco-sa-iosxe-priv-esc-sABD8hcU is classified as critical due to its potential to allow root-level access to affected devices.
To remediate cisco-sa-iosxe-priv-esc-sABD8hcU, you should apply the latest security updates and patches provided by Cisco for IOS XE Software.
Any authenticated local user of Cisco IOS XE Software that supports the Cloud Management for Catalyst migration feature is affected by cisco-sa-iosxe-priv-esc-sABD8hcU.
cisco-sa-iosxe-priv-esc-sABD8hcU allows an authenticated, local attacker to gain root-level privileges on the affected device.
The cisco-sa-iosxe-priv-esc-sABD8hcU vulnerability is due to insufficient memory protection in the Cisco IOS XE Software.