First published: Wed Oct 04 2023(Updated: )
A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.This vulnerability
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-rdocker-uATbukKn is classified as high due to its potential to allow remote authenticated attackers to gain root access.
To fix cisco-sa-rdocker-uATbukKn, update your Cisco IOS XE Software to the latest patched version provided by Cisco.
Cisco IOS XE Software users who utilize the on-device application development workflow feature are affected by cisco-sa-rdocker-uATbukKn.
The impact of cisco-sa-rdocker-uATbukKn allows an authenticated remote attacker to access the operating system with root privileges, compromising system integrity.
Yes, cisco-sa-rdocker-uATbukKn is exploitable from a remote location given that the attacker is authenticated.