Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2025-11724

Опубликовано: 24 сент. 2025
Источник: fstec
CVSS3: 8.8
CVSS2: 10
EPSS Низкий

Описание

Уязвимость компонента HTTP API операционных систем Cisco IOS XE связана с непринятием мер по чистке данных на управляющем уровне. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольные команды

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XE

Версия ПО

17.12.2 (Cisco IOS XE)
17.12.2a (Cisco IOS XE)
17.9.5a (Cisco IOS XE)
17.9.5b (Cisco IOS XE)
17.9.5c (Cisco IOS XE)
17.9.5d (Cisco IOS XE)
17.12.3a (Cisco IOS XE)
17.13.1 (Cisco IOS XE)
17.13.1a (Cisco IOS XE)
17.14.1 (Cisco IOS XE)
17.14.1a (Cisco IOS XE)
17.9.5 (Cisco IOS XE)
17.9.6b (Cisco IOS XE)
17.12.3 (Cisco IOS XE)
17.9.5e (Cisco IOS XE)
17.9.5f (Cisco IOS XE)
17.12.4 (Cisco IOS XE)
17.12.4a (Cisco IOS XE)
17.12.4b (Cisco IOS XE)
17.9.6a (Cisco IOS XE)
17.15.1 (Cisco IOS XE)
17.15.1w (Cisco IOS XE)
17.15.1a (Cisco IOS XE)
17.15.1b (Cisco IOS XE)
17.15.1x (Cisco IOS XE)
17.12.5a (Cisco IOS XE)
17.15.2 (Cisco IOS XE)
17.15.2c (Cisco IOS XE)
17.15.2a (Cisco IOS XE)
17.15.1y (Cisco IOS XE)
17.15.2b (Cisco IOS XE)
17.16.1 (Cisco IOS XE)
17.16.1a (Cisco IOS XE)
17.9.6 (Cisco IOS XE)
17.9.7 (Cisco IOS XE)
17.9.7a (Cisco IOS XE)
17.12.5 (Cisco IOS XE)
17.12.5b (Cisco IOS XE)
17.9.7b (Cisco IOS XE)
17.12.5c (Cisco IOS XE)
17.15.1z (Cisco IOS XE)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XE 17.12.2
Cisco Systems Inc. Cisco IOS XE 17.12.2a
Cisco Systems Inc. Cisco IOS XE 17.9.5a
Cisco Systems Inc. Cisco IOS XE 17.9.5b
Cisco Systems Inc. Cisco IOS XE 17.9.5c
Cisco Systems Inc. Cisco IOS XE 17.9.5d
Cisco Systems Inc. Cisco IOS XE 17.12.3a
Cisco Systems Inc. Cisco IOS XE 17.13.1
Cisco Systems Inc. Cisco IOS XE 17.13.1a
Cisco Systems Inc. Cisco IOS XE 17.14.1
Cisco Systems Inc. Cisco IOS XE 17.14.1a
Cisco Systems Inc. Cisco IOS XE 17.9.5
Cisco Systems Inc. Cisco IOS XE 17.9.6b
Cisco Systems Inc. Cisco IOS XE 17.12.3
Cisco Systems Inc. Cisco IOS XE 17.9.5e
Cisco Systems Inc. Cisco IOS XE 17.9.5f
Cisco Systems Inc. Cisco IOS XE 17.12.4
Cisco Systems Inc. Cisco IOS XE 17.12.4a
Cisco Systems Inc. Cisco IOS XE 17.12.4b
Cisco Systems Inc. Cisco IOS XE 17.9.6a
Cisco Systems Inc. Cisco IOS XE 17.15.1
Cisco Systems Inc. Cisco IOS XE 17.15.1w
Cisco Systems Inc. Cisco IOS XE 17.15.1a
Cisco Systems Inc. Cisco IOS XE 17.15.1b
Cisco Systems Inc. Cisco IOS XE 17.15.1x
Cisco Systems Inc. Cisco IOS XE 17.12.5a
Cisco Systems Inc. Cisco IOS XE 17.15.2
Cisco Systems Inc. Cisco IOS XE 17.15.2c
Cisco Systems Inc. Cisco IOS XE 17.15.2a
Cisco Systems Inc. Cisco IOS XE 17.15.1y
Cisco Systems Inc. Cisco IOS XE 17.15.2b
Cisco Systems Inc. Cisco IOS XE 17.16.1
Cisco Systems Inc. Cisco IOS XE 17.16.1a
Cisco Systems Inc. Cisco IOS XE 17.9.6
Cisco Systems Inc. Cisco IOS XE 17.9.7
Cisco Systems Inc. Cisco IOS XE 17.9.7a
Cisco Systems Inc. Cisco IOS XE 17.12.5
Cisco Systems Inc. Cisco IOS XE 17.12.5b
Cisco Systems Inc. Cisco IOS XE 17.9.7b
Cisco Systems Inc. Cisco IOS XE 17.12.5c
Cisco Systems Inc. Cisco IOS XE 17.15.1z

Уровень опасности уязвимости

Критический уровень опасности (базовая оценка CVSS 2.0 составляет 10)
Высокий уровень опасности (базовая оценка CVSS 3.1 составляет 8,8)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-cmd-inject-rPJM8BGL

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 33%
0.00134
Низкий

8.8 High

CVSS3

10 Critical

CVSS2

Связанные уязвимости

CVSS3: 8.8
nvd
5 месяцев назад

A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

CVSS3: 8.8
github
5 месяцев назад

A vulnerability in the HTTP API subsystem of Cisco IOS XE Software could allow a remote attacker to inject commands that will execute with root privileges into the underlying operating system. This vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by authenticating to an affected system and performing an API call with crafted input. Alternatively, an unauthenticated attacker could persuade a legitimate user with administrative privileges who is currently logged in to the system to click a crafted link. A successful exploit could allow the attacker to execute arbitrary commands as the root user.

EPSS

Процентиль: 33%
0.00134
Низкий

8.8 High

CVSS3

10 Critical

CVSS2