Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-01145

Опубликовано: 28 сент. 2022
Источник: fstec
CVSS3: 6.1
CVSS2: 6.6
EPSS Низкий

Описание

Уязвимость функции проверки образа операционной системы Cisco IOS XE Software сетевых устройств Cisco Catalyst 9200 Series, связана с некорректной проверкой криптографической подписи. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XE

Версия ПО

от 16.6 до 16.12 включительно (Cisco IOS XE)
3.11E (Cisco IOS XE)
от 17.1 до 17.4 включительно (Cisco IOS XE)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE от 16.6 до 16.12 включительно
Cisco Systems Inc. Cisco IOS XE 3.11E
Cisco Systems Inc. Cisco IOS XE от 17.1 до 17.4 включительно

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,1)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cat-verify-D4NEQA6q

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 29%
0.00104
Низкий

6.1 Medium

CVSS3

6.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.1
nvd
больше 3 лет назад

A vulnerability in the software image verification functionality of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. This vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the boot process of the affected device. To exploit this vulnerability, the attacker needs either unauthenticated physical access to the device or privileged access to the root shell on the device. Note: In Cisco IOS XE Software releases 16.11.1 and later, root shell access is protected by the Consent Token mechanism. However, an attacker wit

CVSS3: 6.8
github
больше 3 лет назад

A vulnerability in the software image verification functionality of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. This vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the boot process of the affected device. To exploit this vulnerability, the attacker needs either unauthenticated physical access to the device or privileged access to the root shell on the device. Note: In Cisco IOS XE Software releases 16.11.1 and later, root shell access is protected by the Consent Token mechanism. However, an attacker ...

EPSS

Процентиль: 29%
0.00104
Низкий

6.1 Medium

CVSS3

6.6 Medium

CVSS2