First published: Wed Sep 11 2024(Updated: )
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to read any file in the file system of the underlying Linux operating system. The attacker must have valid credentials on the affected device.This vulnerability is due to incorrect
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxr-shellutil-HCb278wD is considered high due to the potential for authenticated local attackers to read sensitive files.
To fix cisco-sa-iosxr-shellutil-HCb278wD, update to the latest version of Cisco IOS XR Software that addresses this vulnerability.
Devices running affected versions of Cisco IOS XR Software, specifically the Cisco IOS XRv 9000, are susceptible to cisco-sa-iosxr-shellutil-HCb278wD.
The attack vector associated with cisco-sa-iosxr-shellutil-HCb278wD involves authenticated local access to the device.
The impact of cisco-sa-iosxr-shellutil-HCb278wD is that it allows an authenticated attacker to read any file in the underlying Linux file system.