Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20411

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-28 Aug, 2024 | 16:27
Updated At-30 Aug, 2024 | 03:56
Rejected At-
Credits

Cisco NX-OS Bash Arbitrary Code Execution Vulnerability

A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device. This vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:28 Aug, 2024 | 16:27
Updated At:30 Aug, 2024 | 03:56
Rejected At:
â–¼CVE Numbering Authority (CNA)
Cisco NX-OS Bash Arbitrary Code Execution Vulnerability

A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device. This vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco NX-OS Software
Default Status
unknown
Versions
Affected
  • 9.2(3)
  • 7.0(3)I5(2)
  • 6.0(2)A8(7a)
  • 7.0(3)I4(5)
  • 6.0(2)A6(1)
  • 7.0(3)I4(6)
  • 7.0(3)I4(3)
  • 9.2(2v)
  • 6.0(2)A6(5b)
  • 7.0(3)I4(7)
  • 6.0(2)U6(1a)
  • 7.0(3)I4(1)
  • 7.0(3)I4(8)
  • 7.0(3)I4(2)
  • 7.0(3)IM3(1)
  • 6.0(2)U6(5a)
  • 6.0(2)A8(11)
  • 6.0(2)A6(4a)
  • 9.2(1)
  • 9.2(2t)
  • 9.2(3y)
  • 7.0(3)I4(1t)
  • 6.0(2)U6(5c)
  • 6.0(2)A6(4)
  • 7.0(3)I7(6z)
  • 9.3(2)
  • 7.0(3)F3(3)
  • 6.0(2)U6(6)
  • 7.0(3)I7(3z)
  • 7.0(3)IM7(2)
  • 6.0(2)A8(11b)
  • 7.0(3)I7(5a)
  • 7.0(3)I6(1)
  • 6.0(2)U6(10)
  • 7.0(3)IM3(2)
  • 6.0(2)A6(8)
  • 6.0(2)U6(1)
  • 7.0(3)I5(3b)
  • 6.0(2)A6(2a)
  • 6.0(2)U6(7)
  • 9.2(4)
  • 7.0(3)IM3(2a)
  • 6.0(2)A8(10)
  • 6.0(2)A8(2)
  • 7.0(3)IC4(4)
  • 6.0(2)A6(3)
  • 6.0(2)U6(5b)
  • 7.0(3)F3(3c)
  • 7.0(3)F3(1)
  • 6.0(2)U6(5)
  • 7.0(3)F3(5)
  • 6.0(2)A6(7)
  • 7.0(3)I7(2)
  • 6.0(2)A6(5)
  • 7.0(3)IM3(2b)
  • 6.0(2)U6(4a)
  • 7.0(3)I5(3)
  • 7.0(3)I7(3)
  • 6.0(2)A8(6)
  • 7.0(3)I6(2)
  • 6.0(2)A8(5)
  • 6.0(2)U6(8)
  • 7.0(3)IM3(3)
  • 9.3(1)
  • 6.0(2)U6(2)
  • 6.0(2)A8(7)
  • 7.0(3)I7(6)
  • 6.0(2)U6(3a)
  • 6.0(2)A8(11a)
  • 7.0(3)I4(8z)
  • 7.0(3)I4(9)
  • 7.0(3)I7(4)
  • 7.0(3)I7(7)
  • 6.0(2)A8(9)
  • 6.0(2)A8(1)
  • 6.0(2)A6(6)
  • 6.0(2)A8(10a)
  • 7.0(3)I5(1)
  • 9.3(1z)
  • 9.2(2)
  • 7.0(3)F3(4)
  • 7.0(3)I4(8b)
  • 6.0(2)A8(3)
  • 7.0(3)I4(6t)
  • 7.0(3)I5(3a)
  • 6.0(2)A8(8)
  • 7.0(3)I7(5)
  • 7.0(3)F3(3a)
  • 6.0(2)A8(4)
  • 6.0(2)A6(3a)
  • 6.0(2)A6(5a)
  • 7.0(3)F2(1)
  • 7.0(3)I4(8a)
  • 6.0(2)U6(9)
  • 7.0(3)F3(2)
  • 6.0(2)U6(2a)
  • 7.0(3)I4(4)
  • 6.0(2)U6(3)
  • 7.0(3)I7(1)
  • 7.0(3)F2(2)
  • 7.0(3)IA7(2)
  • 7.0(3)IA7(1)
  • 6.0(2)A8(7b)
  • 7.0(3)F1(1)
  • 6.0(2)A6(1a)
  • 6.0(2)A6(2)
  • 6.0(2)A8(4a)
  • 6.0(2)U6(4)
  • 9.3(3)
  • 7.0(3)I7(8)
  • 6.0(2)U6(10a)
  • 9.3(4)
  • 9.3(5)
  • 7.0(3)I7(9)
  • 9.3(6)
  • 10.1(2)
  • 10.1(1)
  • 9.3(5w)
  • 9.3(7)
  • 9.3(7k)
  • 7.0(3)I7(9w)
  • 10.2(1)
  • 9.3(7a)
  • 9.3(8)
  • 7.0(3)I7(10)
  • 10.2(1q)
  • 10.2(2)
  • 9.3(9)
  • 10.1(2t)
  • 10.2(3)
  • 10.2(3t)
  • 9.3(10)
  • 10.2(2a)
  • 10.3(1)
  • 10.2(4)
  • 10.3(2)
  • 9.3(11)
  • 10.3(3)
  • 10.2(5)
  • 9.3(12)
  • 10.2(3v)
  • 10.4(1)
  • 10.3(99w)
  • 10.2(6)
  • 10.3(3w)
  • 10.3(99x)
  • 10.3(3o)
  • 10.3(4)
  • 10.3(3p)
  • 10.3(4a)
  • 10.4(2)
  • 10.3(3q)
  • 9.3(13)
  • 10.2(7)
  • 10.3(3x)
  • 10.3(4g)
  • 10.3(3r)
Problem Types
TypeCWE IDDescription
cweCWE-267Privilege Defined With Unsafe Actions
Type: cwe
CWE ID: CWE-267
Description: Privilege Defined With Unsafe Actions
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Vendor
Cisco Systems, Inc.cisco
Product
nx-os
CPEs
  • cpe:2.3:o:cisco:nx-os:9.2\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(7a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(2v\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(5b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(1a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im3\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(5a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(11\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(4a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(2t\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(3y\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(1t\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(5c\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(6z\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(3z\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im7\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(11b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(5a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i6\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(10\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im3\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(3b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im3\(2a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(10\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)ic4\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(5b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(3c\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im3\(2b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(4a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i6\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)im3\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(3a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(11a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(8z\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(9\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(9\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(10a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(1z\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.2\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(8b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(6t\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(3a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(3a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(5a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f2\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(8a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(9\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f3\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(2a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f2\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)ia7\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)ia7\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(7b\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)f1\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)a8\(4a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:6.0\(2\)u6\(10a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(9\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.1\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.1\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(5w\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(7k\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(9w\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(7a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(8\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(10\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(1q\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(9\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.1\(2t\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(3t\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(10\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(2a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(11\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(5\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(12\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(3v\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.4\(1\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(99w\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(6\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3w\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(99x\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3o\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(4\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3p\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(4a\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.4\(2\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3q\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:9.3\(13\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.2\(7\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3x\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(4g\):*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:nx-os:10.3\(3r\):*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 9.2\(3\)
  • 7.0\(3\)i5\(2\)
  • 6.0\(2\)a8\(7a\)
  • 7.0\(3\)i4\(5\)
  • 6.0\(2\)a6\(1\)
  • 7.0\(3\)i4\(6\)
  • 7.0\(3\)i4\(3\)
  • 9.2\(2v\)
  • 6.0\(2\)a6\(5b\)
  • 7.0\(3\)i4\(7\)
  • 6.0\(2\)u6\(1a\)
  • 7.0\(3\)i4\(1\)
  • 7.0\(3\)i4\(8\)
  • 7.0\(3\)i4\(2\)
  • 7.0\(3\)im3\(1\)
  • 6.0\(2\)u6\(5a\)
  • 6.0\(2\)a8\(11\)
  • 6.0\(2\)a6\(4a\)
  • 9.2\(1\)
  • 9.2\(2t\)
  • 9.2\(3y\)
  • 7.0\(3\)i4\(1t\)
  • 6.0\(2\)u6\(5c\)
  • 6.0\(2\)a6\(4\)
  • 7.0\(3\)i7\(6z\)
  • 9.3\(2\)
  • 7.0\(3\)f3\(3\)
  • 6.0\(2\)u6\(6\)
  • 7.0\(3\)i7\(3z\)
  • 7.0\(3\)im7\(2\)
  • 6.0\(2\)a8\(11b\)
  • 7.0\(3\)i7\(5a\)
  • 7.0\(3\)i6\(1\)
  • 6.0\(2\)u6\(10\)
  • 7.0\(3\)im3\(2\)
  • 6.0\(2\)a6\(8\)
  • 6.0\(2\)u6\(1\)
  • 7.0\(3\)i5\(3b\)
  • 6.0\(2\)a6\(2a\)
  • 6.0\(2\)u6\(7\)
  • 9.2\(4\)
  • 7.0\(3\)im3\(2a\)
  • 6.0\(2\)a8\(10\)
  • 6.0\(2\)a8\(2\)
  • 7.0\(3\)ic4\(4\)
  • 6.0\(2\)a6\(3\)
  • 6.0\(2\)u6\(5b\)
  • 7.0\(3\)f3\(3c\)
  • 7.0\(3\)f3\(1\)
  • 6.0\(2\)u6\(5\)
  • 7.0\(3\)f3\(5\)
  • 6.0\(2\)a6\(7\)
  • 7.0\(3\)i7\(2\)
  • 6.0\(2\)a6\(5\)
  • 7.0\(3\)im3\(2b\)
  • 6.0\(2\)u6\(4a\)
  • 7.0\(3\)i5\(3\)
  • 7.0\(3\)i7\(3\)
  • 6.0\(2\)a8\(6\)
  • 7.0\(3\)i6\(2\)
  • 6.0\(2\)a8\(5\)
  • 6.0\(2\)u6\(8\)
  • 7.0\(3\)im3\(3\)
  • 9.3\(1\)
  • 6.0\(2\)u6\(2\)
  • 6.0\(2\)a8\(7\)
  • 7.0\(3\)i7\(6\)
  • 6.0\(2\)u6\(3a\)
  • 6.0\(2\)a8\(11a\)
  • 7.0\(3\)i4\(8z\)
  • 7.0\(3\)i4\(9\)
  • 7.0\(3\)i7\(4\)
  • 7.0\(3\)i7\(7\)
  • 6.0\(2\)a8\(9\)
  • 6.0\(2\)a8\(1\)
  • 6.0\(2\)a6\(6\)
  • 6.0\(2\)a8\(10a\)
  • 7.0\(3\)i5\(1\)
  • 9.3\(1z\)
  • 9.2\(2\)
  • 7.0\(3\)f3\(4\)
  • 7.0\(3\)i4\(8b\)
  • 6.0\(2\)a8\(3\)
  • 7.0\(3\)i4\(6t\)
  • 7.0\(3\)i5\(3a\)
  • 6.0\(2\)a8\(8\)
  • 7.0\(3\)i7\(5\)
  • 7.0\(3\)f3\(3a\)
  • 6.0\(2\)a8\(4\)
  • 6.0\(2\)a6\(3a\)
  • 6.0\(2\)a6\(5a\)
  • 7.0\(3\)f2\(1\)
  • 7.0\(3\)i4\(8a\)
  • 6.0\(2\)u6\(9\)
  • 7.0\(3\)f3\(2\)
  • 6.0\(2\)u6\(2a\)
  • 7.0\(3\)i4\(4\)
  • 6.0\(2\)u6\(3\)
  • 7.0\(3\)i7\(1\)
  • 7.0\(3\)f2\(2\)
  • 7.0\(3\)ia7\(2\)
  • 7.0\(3\)ia7\(1\)
  • 6.0\(2\)a8\(7b\)
  • 7.0\(3\)f1\(1\)
  • 6.0\(2\)a6\(1a\)
  • 6.0\(2\)a6\(2\)
  • 6.0\(2\)a8\(4a\)
  • 6.0\(2\)u6\(4\)
  • 9.3\(3\)
  • 7.0\(3\)i7\(8\)
  • 6.0\(2\)u6\(10a\)
  • 9.3\(4\)
  • 9.3\(5\)
  • 7.0\(3\)i7\(9\)
  • 9.3\(6\)
  • 10.1\(2\)
  • 10.1\(1\)
  • 9.3\(5w\)
  • 9.3\(7\)
  • 9.3\(7k\)
  • 7.0\(3\)i7\(9w\)
  • 10.2\(1\)
  • 9.3\(7a\)
  • 9.3\(8\)
  • 7.0\(3\)i7\(10\)
  • 10.2\(1q\)
  • 10.2\(2\)
  • 9.3\(9\)
  • 10.1\(2t\)
  • 10.2\(3\)
  • 10.2\(3t\)
  • 9.3\(10\)
  • 10.2\(2a\)
  • 10.3\(1\)
  • 10.2\(4\)
  • 10.3\(2\)
  • 9.3\(11\)
  • 10.3\(3\)
  • 10.2\(5\)
  • 9.3\(12\)
  • 10.2\(3v\)
  • 10.4\(1\)
  • 10.3\(99w\)
  • 10.2\(6\)
  • 10.3\(3w\)
  • 10.3\(99x\)
  • 10.3\(3o\)
  • 10.3\(4\)
  • 10.3\(3p\)
  • 10.3\(4a\)
  • 10.4\(2\)
  • 10.3\(3q\)
  • 9.3\(13\)
  • 10.2\(7\)
  • 10.3\(3x\)
  • 10.3\(4g\)
  • 10.3\(3r\)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:28 Aug, 2024 | 17:15
Updated At:29 Aug, 2024 | 13:25

A vulnerability in Cisco NX-OS Software could allow an authenticated, local attacker with privileges to access the Bash shell to execute arbitrary code as root on an affected device. This vulnerability is due to insufficient security restrictions when executing commands from the Bash shell. An attacker with privileges to access the Bash shell could exploit this vulnerability by executing a specific crafted command on the underlying operating system. A successful exploit could allow the attacker to execute arbitrary code with the privileges of root.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-267Secondaryykramarz@cisco.com
CWE ID: CWE-267
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7ykramarz@cisco.com
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bshacepe-bApeHSx7
Source: ykramarz@cisco.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

161Records found

CVE-2021-1375
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.55%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:15
Updated-08 Nov, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Fast Reload Vulnerabilities

Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2023-20075
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.04% / 13.81%
||
7 Day CHG-0.01%
Published-16 Feb, 2023 | 15:25
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the CLI of Cisco Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary commands. These vulnerability is due to improper input validation in the CLI. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-email_security_applianceCisco Secure Email
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-20121
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.08% / 23.21%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-28 Oct, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities

Multiple vulnerabilities in the restricted shell of Cisco Evolved Programmable Network Manager (EPNM), Cisco Identity Services Engine (ISE), and Cisco Prime Infrastructure could allow an authenticated, local attacker to escape the restricted shell and gain root privileges on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineprime_infrastructureevolved_programmable_network_managerCisco Identity Services Engine Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-20090
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 15.70%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 15:19
Updated-30 Jul, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability

A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_collaboration_endpointroomosCisco TelePresence Endpoint Software (TC/CE)Cisco RoomOS Softwaretelepresence_collaboration_endpoint
CWE ID-CWE-27
Path Traversal: 'dir/../../filename'
CVE-2023-20097
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 20.35%
||
7 Day CHG~0.00%
Published-23 Mar, 2023 | 00:00
Updated-25 Oct, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Access Point Software Command Injection Vulnerability

A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-aironet_1562icatalyst_iw6300catalyst_9124aironet_1560catalyst_iw6300_dcwcatalyst_iw6300_acaironet_3800ecatalyst_9105axwaironet_1810wesw6300catalyst_9120axeaironet_1815tcatalyst_9130axecatalyst_9130_apaironet_1800catalyst_iw6300_dcaironet_1562eaironet_2800iaironet_1542iaironet_3800pcatalyst_9117catalyst_9120axpwireless_lan_controller_softwareaironet_1815catalyst_9115aironet_1540catalyst_9100catalyst_9115axiaironet_1815icatalyst_9105axaironet_1815waironet_4800catalyst_9117axiaironet_2800catalyst_9120_apaironet_1542dcatalyst_9130catalyst_9130axiaironet_3800catalyst_9115axaironet_access_point_softwareaironet_1800icatalyst_9120aironet_1562dcatalyst_9120axcatalyst_9124axdcatalyst_9105axicatalyst_9120axicatalyst_9117axaironet_3800iios_xecatalyst_9115axecatalyst_9130axcatalyst_9124axicatalyst_9117_apaironet_1815maironet_2800ecatalyst_9124axaironet_1810catalyst_9105catalyst_9115_apCisco Aironet Access Point Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2023-20043
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 17.03%
||
7 Day CHG~0.00%
Published-19 Jan, 2023 | 01:36
Updated-02 Aug, 2024 | 08:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-cx_cloud_agentCisco CX Cloud Agent
CWE ID-CWE-708
Incorrect Ownership Assignment
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-20166
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.06% / 20.00%
||
7 Day CHG~0.00%
Published-18 May, 2023 | 00:00
Updated-28 Oct, 2024 | 16:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Path Traversal Vulnerabilities

Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform path traversal attacks on the underlying operating system to either elevate privileges to root or read arbitrary files. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-24
Path Traversal: '../filedir'
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-20153
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-28 Oct, 2024 | 16:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Command Injection Vulnerabilities

Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-20152
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-06 Nov, 2024 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Command Injection Vulnerabilities

Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-20260
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 5.27%
||
7 Day CHG~0.00%
Published-17 Jan, 2024 | 16:57
Updated-13 Nov, 2024 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-prime_infrastructureevolved_programmable_network_managerCisco Prime InfrastructureCisco Evolved Programmable Network Manager (EPNM)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2023-20023
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.00%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-28 Oct, 2024 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Privilege Escalation Vulnerabilities

Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-20170
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.03% / 9.72%
||
7 Day CHG~0.00%
Published-01 Nov, 2023 | 17:12
Updated-16 Dec, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Administrator-level privileges on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-34723
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.24%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:25
Updated-07 Nov, 2024 | 21:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Arbitrary File Overwrite Vulnerability

A vulnerability in a specific CLI command that is run on Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to overwrite arbitrary files in the configuration database of an affected device. This vulnerability is due to insufficient validation of specific CLI command parameters. An attacker could exploit this vulnerability by issuing that command with specific parameters. A successful exploit could allow the attacker to overwrite the content of the configuration database and gain root-level access to an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-1100-4g_integrated_services_routerasr_10134321_integrated_services_router1100-6g_integrated_services_routerasr_10234431_integrated_services_routerasr_10011100-4gltena_integrated_services_router1100_integrated_services_routerios_xe1100-lte_integrated_services_router4331_integrated_services_routerasr_1006asr_1000-xasr_1002asr_1001-xasr_10041100-4gltegb_integrated_services_routerasr_1002-xcsr1000v4351_integrated_services_routerCisco IOS XE Software
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-34726
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.09% / 25.28%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 02:26
Updated-07 Nov, 2024 | 21:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Software Command Injection Vulnerability

A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system of an affected device. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root-level privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wanCisco SD-WAN Solution
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-20143
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 4.81%
||
7 Day CHG~0.00%
Published-12 Mar, 2025 | 16:12
Updated-22 Jul, 2025 | 12:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software Secure Boot Bypass Vulnerability

A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to insufficient verification of modules in the software load process. An attacker could exploit this vulnerability by manipulating the loaded binaries to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: This vulnerability affects Cisco IOS XR Software, not the Secure Boot feature. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-20185
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-3.4||LOW
EPSS-0.03% / 9.39%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 16:14
Updated-06 Aug, 2025 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email and Web Manager, Secure Email Gateway, and Secure Web Appliance Privilege Escalation Vulnerability

A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. This vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. Note: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_manager_virtual_appliance_m300vsecure_email_and_web_manager_m390secure_email_and_web_manager_m690secure_email_and_web_manager_virtual_appliance_m600vsecure_email_and_web_manager_m190secure_email_and_web_manager_m390xsecure_email_and_web_manager_m690xsecure_email_and_web_manager_m170secure_email_and_web_manager_m395secure_email_and_web_manager_m680secure_email_and_web_manager_m195asyncossecure_email_and_web_manager_virtual_appliance_m100vsecure_email_and_web_manager_m380secure_email_and_web_manager_m695Cisco Secure EmailCisco Secure Web ApplianceCisco Secure Email and Web Manager
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2025-20313
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 28.84%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 17:12
Updated-15 Oct, 2025 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple vulnerabilities in Cisco IOS XE Software of could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. These vulnerabilities are due path traversal and improper image integrity validation. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. For more information about these vulnerabilities, see the Details ["#details"] section of this advisory. ERP

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IOS XE Software
CWE ID-CWE-35
Path Traversal: '.../...//'
CVE-2025-20314
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 23.77%
||
7 Day CHG-0.02%
Published-24 Sep, 2025 | 17:53
Updated-15 Oct, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IOS XE Software
CWE ID-CWE-232
Improper Handling of Undefined Values
CVE-2021-1447
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.96%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:40
Updated-08 Nov, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Content Security Management Appliance Privilege Escalation Vulnerability

A vulnerability in the user account management system of Cisco AsyncOS for Cisco Content Security Management Appliance (SMA) could allow an authenticated, local attacker to elevate their privileges to root. This vulnerability is due to a procedural flaw in the password generation algorithm. An attacker could exploit this vulnerability by enabling specific Administrator-only features and connecting to the appliance through the CLI with elevated privileges. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system. To exploit this vulnerability, the attacker must have valid Administrator credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-content_security_management_applianceCisco Content Security Management Appliance (SMA)
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-1462
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.06% / 18.90%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 15:30
Updated-04 Aug, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Privilege Escalation Vulnerability

A vulnerability in the CLI of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to elevate privileges on an affected system. To exploit this vulnerability, an attacker would need to have a valid Administrator account on an affected system. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to an affected system with an Administrator account and creating a malicious file, which the system would parse at a later time. A successful exploit could allow the attacker to obtain root privileges on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_sd-wan_managerCisco Catalyst SD-WAN Manager
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1441
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 22.39%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Hardware Initialization Routines Arbitrary Code Execution Vulnerability

A vulnerability in the hardware initialization routines of Cisco IOS XE Software for Cisco 1100 Series Industrial Integrated Services Routers and Cisco ESR6300 Embedded Series Routers could allow an authenticated, local attacker to execute unsigned code at system boot time. This vulnerability is due to incorrect validations of parameters passed to a diagnostic script that is executed when the device boots up. An attacker could exploit this vulnerability by tampering with an executable file stored on a device. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need administrative level credentials (level 15) on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeesr6300ir1101Cisco IOS XE Software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1557
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.11%
||
7 Day CHG~0.00%
Published-22 May, 2021 | 06:40
Updated-08 Nov, 2024 | 21:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco DNA Spaces Connector Privilege Escalation Vulnerabilities

Multiple vulnerabilities in Cisco DNA Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. These vulnerabilities are due to insufficient restrictions during the execution of affected CLI commands. An attacker could exploit these vulnerabilities by leveraging the insufficient restrictions during execution of these commands. A successful exploit could allow the attacker to elevate privileges from dnasadmin and execute arbitrary commands on the underlying operating system as root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-dna_spaces\Cisco DNA Spaces Connector
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1382
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 22.25%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Command Injection Vulnerability

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with root privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to execute commands with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1558
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.07% / 21.11%
||
7 Day CHG~0.00%
Published-22 May, 2021 | 06:40
Updated-08 Nov, 2024 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco DNA Spaces Connector Privilege Escalation Vulnerabilities

Multiple vulnerabilities in Cisco DNA Spaces Connector could allow an authenticated, local attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. These vulnerabilities are due to insufficient restrictions during the execution of affected CLI commands. An attacker could exploit these vulnerabilities by leveraging the insufficient restrictions during execution of these commands. A successful exploit could allow the attacker to elevate privileges from dnasadmin and execute arbitrary commands on the underlying operating system as root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-dna_spaces\Cisco DNA Spaces Connector
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1391
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.04% / 12.54%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and IOS XE Software Privilege Escalation Vulnerability

A vulnerability in the dragonite debugger of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root privilege. The vulnerability is due to the presence of development testing and verification scripts that remained on the device. An attacker could exploit this vulnerability by bypassing the consent token mechanism with the residual scripts on the affected device. A successful exploit could allow the attacker to escalate from privilege level 15 to root privilege.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeiosCisco IOS
CWE ID-CWE-489
Active Debug Code
CVE-2021-1454
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.11% / 29.19%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities

Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeios_xe_sd-wanCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2021-1488
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.32%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 17:31
Updated-08 Nov, 2024 | 23:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000 and 2100 Series Appliances Command Injection Vulnerability

A vulnerability in the upgrade process of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to inject commands that could be executed with root privileges on the underlying operating system (OS). This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted upgrade package file to an affected device. A successful exploit could allow the attacker to inject commands that could be executed with root privileges on the underlying OS.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_1010firepower_2140firepower_1140firepower_2120adaptive_security_appliance_softwarefirepower_2130firepower_1120firepower_1150firepower_2110firepower_threat_defenseCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1520
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.45%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:51
Updated-08 Nov, 2024 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Local Privilege Escalation Vulnerability

A vulnerability in the internal message processing of Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, local attacker to run arbitrary commands with root privileges on the underlying operating system (OS). This vulnerability exists because an internal messaging service does not properly sanitize input. An attacker could exploit this vulnerability by first authenticating to the device and then sending a crafted request to the internal service. A successful exploit could allow the attacker to run arbitrary commands with root privileges on the underlying OS. To exploit this vulnerability, the attacker must have valid Administrator credentials for the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv340_firmwarerv340wrv345prv345rv345_firmwarerv345p_firmwarerv340rv340w_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-123
Write-what-where Condition
CVE-2021-1449
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 13.74%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Access Point Software Arbitrary Code Execution Vulnerability

A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-aironet_2800catalyst_9800_firmwareaironet_1800catalyst_iw6300aironet_1560aironet_3800aironet_access_point_softwarecatalyst_9800esw6300wireless_lan_controller_softwareaironet_1540catalyst_91001100_integrated_services_routeraironet_4800Cisco Aironet Access Point Software
CWE ID-CWE-284
Improper Access Control
CVE-2021-1383
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.15% / 35.52%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:07
Updated-08 Nov, 2024 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE SD-WAN Software Parameter Injection Vulnerabilities

Multiple vulnerabilities in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to access the underlying operating system with root privileges. These vulnerabilities are due to insufficient input validation of certain CLI commands. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as an administrative user to execute the affected commands. A successful exploit could allow the attacker to access the underlying operating system with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeios_xe_sd-wanCisco IOS XE Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2021-1244
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.95%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:35
Updated-08 Nov, 2024 | 23:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities

Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-82018808ncs_540881288188202ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-1136
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 5.95%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:35
Updated-08 Nov, 2024 | 23:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software for Cisco 8000 Series Routers and Network Convergence System 540 Series Routers Image Verification Vulnerabilities

Multiple vulnerabilities in Cisco Network Convergence System (NCS) 540 Series Routers, only when running Cisco IOS XR NCS540L software images, and Cisco IOS XR Software for the Cisco 8000 Series Routers could allow an authenticated, local attacker to execute unsigned code during the boot process on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-82018808ncs_540881288188202ios_xrCisco IOS XR Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-1376
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 6.55%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:15
Updated-08 Nov, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Fast Reload Vulnerabilities

Multiple vulnerabilities in the fast reload feature of Cisco IOS XE Software running on Cisco Catalyst 3850, Cisco Catalyst 9300, and Cisco Catalyst 9300L Series Switches could allow an authenticated, local attacker to either execute arbitrary code on the underlying operating system, install and boot a malicious software image, or execute unsigned binaries on an affected device. These vulnerabilities are due to improper checks performed by system boot routines. To exploit these vulnerabilities, the attacker would need privileged access to the CLI of the device. A successful exploit could allow the attacker to either execute arbitrary code on the underlying operating system or execute unsigned code and bypass the image verification check part of the secure boot process. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2025-20277
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-3.4||LOW
EPSS-0.03% / 10.49%
||
7 Day CHG+0.01%
Published-04 Jun, 2025 | 16:18
Updated-22 Jul, 2025 | 13:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Contact Center Express Path Traversal Vulnerability

A vulnerability in the web-based management interface of Cisco Unified CCX could allow an authenticated, local attacker to execute arbitrary code on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper limitation of a pathname to a restricted directory (path traversal). An attacker could exploit this vulnerability by sending a crafted web request to an affected device, followed by a specific command through an SSH session. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system of an affected device as a low-privilege user. A successful exploit could also allow the attacker to undertake further actions to elevate their privileges to root.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_contact_center_expressCisco Unified Contact Center Express
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-3601
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.11% / 30.12%
||
7 Day CHG~0.00%
Published-08 Oct, 2020 | 04:21
Updated-13 Nov, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco StarOS Privilege Escalation Vulnerability

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-starosasr_5500asr_5700Cisco ASR 5000 Series Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-3236
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 14.26%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:21
Updated-15 Nov, 2024 | 17:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability

A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files. The attacker would need valid administrative credentials. This vulnerability is due to improper input validation of CLI command arguments. An attacker could exploit this vulnerability by using path traversal techniques when executing a vulnerable command. A successful exploit could allow the attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_network_function_virtualization_infrastructureCisco Enterprise NFV Infrastructure Software
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-3423
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.06% / 18.31%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Arbitrary Code Execution Vulnerability

A vulnerability in the implementation of the Lua interpreter that is integrated in Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary code with root privileges on the underlying Linux operating system (OS) of an affected device. The vulnerability is due to insufficient restrictions on Lua function calls within the context of user-supplied Lua scripts. An attacker with valid administrative credentials could exploit this vulnerability by submitting a malicious Lua script. When this file is processed, an exploitable buffer overflow condition could occur. A successful exploit could allow the attacker to execute arbitrary code with root privileges on the underlying Linux OS of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-4451-x_integrated_services_router1111x_integrated_services_routerasr_10134321_integrated_services_routercbr-8_converged_broadband_router4351_integrated_services_router4431_integrated_services_router1160_integrated_services_routercloud_services_router_1000vasr_1002-hx1100_integrated_services_routerios_xe4221_integrated_services_router4331_integrated_services_routerasr_10064461_integrated_services_routerasr_1001-xasr_10041109_integrated_services_router1101_integrated_services_routerasr_1001-hxasr_1002-x111x_integrated_services_router1120_integrated_services_routerasr_1009-xasr_1006-xCisco IOS XE Software 3.7.0S
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2020-3417
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 24.53%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Arbitrary Code Execution Vulnerability

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker to execute persistent code at boot time and break the chain of trust. This vulnerability is due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit this vulnerability by installing code to a specific directory in the underlying operating system (OS) and setting a specific ROMMON variable. A successful exploit could allow the attacker to execute persistent code on the underlying OS. To exploit this vulnerability, the attacker would need access to the root shell on the device or have physical access to the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-3457
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.74%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:36
Updated-13 Nov, 2024 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco FXOS Software Command Injection Vulnerability

A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_4150firepower_1010firepower_1140firepower_2120firepower_2130adaptive_security_appliance_softwarefirepower_9300_sm-24firepower_9300_sm-36firepower_2100firepower_4110firepower_1120firepower_extensible_operating_systemfirepower_2110firepower_4125firepower_1000firepower_9300_sm-48firepower_4112firepower_4140firepower_2140firepower_9300_sm-44_x_3firepower_9300_sm-40firepower_4145firepower_4120firepower_9300_sm-56firepower_9300_sm-56_x_3firepower_threat_defensefirepower_1150firepower_4115firepower_9300_sm-44Cisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-3213
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.85%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:41
Updated-15 Nov, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Privilege Escalation Vulnerability

A vulnerability in the ROMMON of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to those of the root user of the underlying operating system. The vulnerability is due to the ROMMON allowing for special parameters to be passed to the device at initial boot up. An attacker could exploit this vulnerability by sending parameters to the device at initial boot up. An exploit could allow the attacker to elevate from a Priv15 user to the root user and execute arbitrary commands with the privileges of the root user.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 3.8.0S
CWE ID-CWE-264
Not Available
CVE-2020-3514
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-8.2||HIGH
EPSS-0.03% / 8.83%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:35
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability

A vulnerability in the multi-instance feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to escape the container for their Cisco FTD instance and execute commands with root privileges in the host namespace. The attacker must have valid credentials on the device.The vulnerability exists because a configuration file that is used at container startup has insufficient protections. An attacker could exploit this vulnerability by modifying a specific container configuration file on the underlying file system. A successful exploit could allow the attacker to execute commands with root privileges within the host namespace. This could allow the attacker to impact other running Cisco FTD instances or the host Cisco FXOS device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-216
DEPRECATED: Containment Errors (Container Errors)
CVE-2020-3138
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 8.33%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 19:15
Updated-15 Nov, 2024 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software Remote Code Execution Vulnerability

A vulnerability in the upgrade component of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to install a malicious file when upgrading. The vulnerability is due to insufficient signature validation. An attacker could exploit this vulnerability by providing a crafted upgrade file. A successful exploit could allow the attacker to upload crafted code to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_network_function_virtualization_infrastructureNA
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2020-3602
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.12% / 31.84%
||
7 Day CHG~0.00%
Published-08 Oct, 2020 | 04:21
Updated-13 Nov, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco StarOS Privilege Escalation Vulnerability

A vulnerability in the CLI of Cisco StarOS operating system for Cisco ASR 5000 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. The vulnerability is due to insufficient input validation of CLI commands. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the root user on the affected device. To exploit this vulnerability, an attacker would need to have valid credentials on an affected device and know the password for the cli test-commands command.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-starosasr_5500asr_5700Cisco ASR 5000 Series Software
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-27122
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 14.42%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:15
Updated-13 Nov, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Privilege Escalation Vulnerability

A vulnerability in the Microsoft Active Directory integration of Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to elevate privileges on an affected device. To exploit this vulnerability, an attacker would need to have a valid administrator account on an affected device. The vulnerability is due to incorrect privilege assignment. An attacker could exploit this vulnerability by logging in to the system with a crafted Active Directory account. A successful exploit could allow the attacker to obtain root privileges on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-3253
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 10.07%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:41
Updated-15 Nov, 2024 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Shell Access Vulnerability

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-284
Improper Access Control
CVE-2020-3166
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.17% / 38.36%
||
7 Day CHG~0.00%
Published-26 Feb, 2020 | 16:51
Updated-15 Nov, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco FXOS Software CLI Arbitrary File Read and Write Vulnerability

A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to read or write arbitrary files on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to a specific CLI command. A successful exploit could allow the attacker to read or write to arbitrary files on the underlying OS.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_9300firepower_4150firepower_1010firepower_1140firepower_2120firepower_2130adaptive_security_appliance_softwarefirepower_4110firepower_1120firepower_extensible_operating_systemfirepower_2110firepower_4125firepower_4140firepower_2140firepower_4145firepower_4120firepower_1150firepower_4115firepower_threat_defenseCisco Firepower Extensible Operating System (FXOS)
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3215
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.42%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:41
Updated-15 Nov, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Privilege Escalation Vulnerability

A vulnerability in the Virtual Services Container of Cisco IOS XE Software could allow an authenticated, local attacker to gain root-level privileges on an affected device. The vulnerability is due to insufficient validation of a user-supplied open virtual appliance (OVA). An attacker could exploit this vulnerability by installing a malicious OVA on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 3.8.0S
CWE ID-CWE-264
Not Available
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3169
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.15% / 35.02%
||
7 Day CHG~0.00%
Published-26 Feb, 2020 | 16:50
Updated-15 Nov, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco FXOS Software CLI Command Injection Vulnerability

A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a specific CLI command on the affected device. An attacker could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system with root privileges. An attacker would need valid administrator credentials to exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_4150firepower_9300_sm-24firepower_9300_sm-36firepower_4110firepower_extensible_operating_systemfirepower_9300_sm-48firepower_4125firepower_4140firepower_9300_sm-44_x_3firepower_9300_sm-40firepower_4145firepower_4120firepower_9300_sm-56firepower_9300_sm-56_x_3firepower_4115firepower_9300_sm-44Cisco Firepower Extensible Operating System (FXOS)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-27129
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.17% / 37.75%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 18:15
Updated-13 Nov, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Command Injection Vulnerability

A vulnerability in the remote management feature of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to inject arbitrary commands and potentially gain elevated privileges. The vulnerability is due to improper validation of commands to the remote management CLI of the affected application. An attacker could exploit this vulnerability by sending malicious requests to the affected application. A successful exploit could allow the attacker to inject arbitrary commands and potentially gain elevated privileges.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanageCisco SD-WAN vManage
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2025-20278
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-6||MEDIUM
EPSS-0.02% / 3.90%
||
7 Day CHG~0.00%
Published-04 Jun, 2025 | 16:18
Updated-31 Jul, 2025 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Unified Communications Products Command Injection Vulnerability

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_communications_managerunified_contact_center_expressunified_intelligence_centervirtualized_voice_browserunified_communications_manager_im_and_presence_servicesocialminerfinesseunity_connectionCisco Unified Communications Manager IM and Presence ServiceCisco Unified Contact Center ExpressCisco Unified Intelligence CenterCisco Unified Communications ManagerCisco FinesseCisco Virtualized Voice BrowserCisco Unity ConnectionCisco SocialMiner
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found