Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8qm4-vmvc-xrpj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.6

Описание

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

EPSS

Процентиль: 7%
0.00028
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 6.6
nvd
почти 5 лет назад

A vulnerability in the role-based access control of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker with read-only privileges to obtain administrative privileges by using the console port when the device is in the default SD-WAN configuration. This vulnerability occurs because the default configuration is applied for console authentication and authorization. An attacker could exploit this vulnerability by connecting to the console port and authenticating as a read-only user. A successful exploit could allow a user with read-only permissions to access administrative privileges.

CVSS3: 6.6
fstec
почти 5 лет назад

Уязвимость функции управления доступом на основе ролей (RBAC) программного обеспечения Cisco IOS XE SD-WAN, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 7%
0.00028
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-269