Логотип exploitDog
bind:CVE-2024-20278
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20278

Количество 3

Количество 3

nvd логотип

CVE-2024-20278

почти 2 года назад

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w3pw-jcpx-2qcc

почти 2 года назад

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-02820

почти 2 года назад

Уязвимость реализации протокола NETCONF операционных систем Cisco IOS XE, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20278

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
github логотип
GHSA-w3pw-jcpx-2qcc

A vulnerability in the NETCONF feature of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate privileges to root on an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted input over NETCONF to an affected device. A successful exploit could allow the attacker to elevate privileges from Administrator to root.

CVSS3: 6.5
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02820

Уязвимость реализации протокола NETCONF операционных систем Cisco IOS XE, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6.5
0%
Низкий
почти 2 года назад

Уязвимостей на страницу