Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wpmf-xfg7-q3gp

Опубликовано: 24 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

EPSS

Процентиль: 27%
0.00097
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-232

Связанные уязвимости

CVSS3: 6.7
nvd
5 месяцев назад

A vulnerability in Cisco IOS XE Software could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to improper validation of software packages. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute persistent code on the underlying operating system. Because this vulnerability allows an attacker to bypass a major security feature of a device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.

CVSS3: 6.7
fstec
5 месяцев назад

Уязвимость операционных систем Cisco IOS XE, связанная с неправильной обработкой неопределенных значений, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 27%
0.00097
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-232