First published: Wed Mar 27 2024(Updated: )
A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device.This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-priv-esc-seAx6NLX is rated as high due to the potential for privilege escalation.
To fix cisco-sa-iosxe-priv-esc-seAx6NLX, apply the latest security patches released by Cisco for the affected IOS XE Software.
Devices running Cisco IOS XE Software with the NETCONF feature enabled are affected by cisco-sa-iosxe-priv-esc-seAx6NLX.
cisco-sa-iosxe-priv-esc-seAx6NLX enables authenticated, remote attackers to escalate their privileges to root on affected devices.
Yes, an attacker must be authenticated to exploit cisco-sa-iosxe-priv-esc-seAx6NLX.