First published: Wed Jun 03 2020(Updated: )
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, unprivileged, and local attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: By default, Tcl shell access requires privilege level 15. Through custom privilege configuration, Tcl shell access could be granted to a lower-privileged user. The CVSS score takes this into consideration. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-dos-MAZQUnMF
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-tcl-dos-MAZQUnMF vulnerability has a medium severity rating.
To mitigate cisco-sa-tcl-dos-MAZQUnMF, update your Cisco IOS or IOS XE Software to a version that includes the security patch.
The vulnerability affects authenticated users of Cisco IOS and Cisco IOS XE Software.
cisco-sa-tcl-dos-MAZQUnMF can be exploited to cause a denial of service (DoS) condition.
cisco-sa-tcl-dos-MAZQUnMF requires an authenticated, unprivileged, and local attacker, which makes it less likely to be exploited remotely.