First published: Thu Sep 24 2020(Updated: )
A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to execute persistent code at boot time and break the chain of trust. This vulnerability is due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit this vulnerability by installing code to a specific directory in the underlying operating system (OS) and setting a specific ROMMON variable. A successful exploit could allow the attacker to execute persistent code on the underlying OS. To exploit this vulnerability, the attacker would need access to the root shell on the device or have physical access to the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: by X.B. the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =16.12.03a<Catalyst 9300/9400/9500 Series Switches=16.12.03a<Catalyst 3850 Series Switches | Catalyst 9300/9400/9500 Series Switches Catalyst 3850 Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco IOS XE Software Arbitrary Code Execution Vulnerability is medium with a severity value of 6.7.
Catalyst 9300/9400/9500 Series Switches and Catalyst 3850 Series Switches running IOS XE Software version 16.12.03a are affected by this vulnerability.
An authenticated, local attacker could exploit this vulnerability by executing persistent code at boot time and breaking the chain of trust.
This vulnerability is caused by incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set.
You can find more information about Cisco IOS XE Software Arbitrary Code Execution Vulnerability on the Cisco Security Advisory page at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xbace-OnCEbyS.