CWE
20
Advisory Published

cisco-sa-tcl-dos-MAZQUnMF: Cisco IOS and IOS XE Software Tcl Denial of Service Vulnerability

First published: Wed Jun 03 2020(Updated: )

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, unprivileged, and local attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient input validation of data passed to the Tcl interpreter. An attacker could exploit this vulnerability by executing crafted Tcl arguments on an affected device. An exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Note: By default, Tcl shell access requires privilege level 15. Through custom privilege configuration, Tcl shell access could be granted to a lower-privileged user. The CVSS score takes this into consideration. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tcl-dos-MAZQUnMF

Affected SoftwareAffected VersionHow to fix
Cisco IOS
Cisco IOS XE Software

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of cisco-sa-tcl-dos-MAZQUnMF?

    The cisco-sa-tcl-dos-MAZQUnMF vulnerability has a medium severity rating.

  • How do I fix cisco-sa-tcl-dos-MAZQUnMF?

    To mitigate cisco-sa-tcl-dos-MAZQUnMF, update your Cisco IOS or IOS XE Software to a version that includes the security patch.

  • Who is affected by cisco-sa-tcl-dos-MAZQUnMF?

    The vulnerability affects authenticated users of Cisco IOS and Cisco IOS XE Software.

  • What type of attack can exploit cisco-sa-tcl-dos-MAZQUnMF?

    cisco-sa-tcl-dos-MAZQUnMF can be exploited to cause a denial of service (DoS) condition.

  • Is cisco-sa-tcl-dos-MAZQUnMF easy to exploit?

    cisco-sa-tcl-dos-MAZQUnMF requires an authenticated, unprivileged, and local attacker, which makes it less likely to be exploited remotely.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203