CVE-2020-3167
Published on: 02/26/2020 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:23:38 PM UTC
CVE-2020-3167 - advisory for cisco-sa-20200226-fxos-ucs-cmdinj
Source: Mitre Source: NIST CVE.ORG Print: PDF
Certain versions of Adaptive Security Appliance Software from Cisco contain the following vulnerability:
A vulnerability in the CLI of Cisco FXOS Software and Cisco UCS Manager Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system (OS). The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by including crafted arguments to specific commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS with the privileges of the currently logged-in user for all affected platforms excluding Cisco UCS 6400 Series Fabric Interconnects. On Cisco UCS 6400 Series Fabric Interconnects, the injected commands are executed with root privileges.
- CVE-2020-3167 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
- The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
- Affected Vendor/Software:
Cisco - Cisco Adaptive Security Appliance (ASA) Software version n/a
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.2 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco FXOS and UCS Manager Software CLI Command Injection Vulnerability | Vendor Advisory tools.cisco.com text/html |
![]() |
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Cisco | Adaptive Security Appliance Software | All | All | All | All |
Application | Cisco | Adaptive Security Appliance Software | All | All | All | All |
Hardware
| Cisco | Firepower 1010 | - | All | All | All |
Hardware
| Cisco | Firepower 1010 | - | All | All | All |
Hardware
| Cisco | Firepower 1120 | - | All | All | All |
Hardware
| Cisco | Firepower 1120 | - | All | All | All |
Hardware
| Cisco | Firepower 1140 | - | All | All | All |
Hardware
| Cisco | Firepower 1140 | - | All | All | All |
Hardware
| Cisco | Firepower 1150 | - | All | All | All |
Hardware
| Cisco | Firepower 1150 | - | All | All | All |
Hardware
| Cisco | Firepower 2110 | - | All | All | All |
Hardware
| Cisco | Firepower 2110 | - | All | All | All |
Hardware
| Cisco | Firepower 2120 | - | All | All | All |
Hardware
| Cisco | Firepower 2120 | - | All | All | All |
Hardware
| Cisco | Firepower 2130 | - | All | All | All |
Hardware
| Cisco | Firepower 2130 | - | All | All | All |
Hardware
| Cisco | Firepower 2140 | - | All | All | All |
Hardware
| Cisco | Firepower 2140 | - | All | All | All |
Hardware
| Cisco | Firepower 4110 | - | All | All | All |
Hardware
| Cisco | Firepower 4110 | - | All | All | All |
Hardware
| Cisco | Firepower 4115 | - | All | All | All |
Hardware
| Cisco | Firepower 4115 | - | All | All | All |
Hardware
| Cisco | Firepower 4120 | - | All | All | All |
Hardware
| Cisco | Firepower 4120 | - | All | All | All |
Hardware
| Cisco | Firepower 4125 | - | All | All | All |
Hardware
| Cisco | Firepower 4125 | - | All | All | All |
Hardware
| Cisco | Firepower 4140 | - | All | All | All |
Hardware
| Cisco | Firepower 4140 | - | All | All | All |
Hardware
| Cisco | Firepower 4145 | - | All | All | All |
Hardware
| Cisco | Firepower 4145 | - | All | All | All |
Hardware
| Cisco | Firepower 4150 | - | All | All | All |
Hardware
| Cisco | Firepower 4150 | - | All | All | All |
Hardware
| Cisco | Firepower 9300 | - | All | All | All |
Hardware
| Cisco | Firepower 9300 | - | All | All | All |
Application | Cisco | Firepower Threat Defense | All | All | All | All |
Application | Cisco | Firepower Threat Defense | All | All | All | All |
Operating System | Cisco | Fxos | All | All | All | All |
Operating System | Cisco | Fxos | All | All | All | All |
Hardware
| Cisco | Ucs 6248up | - | All | All | All |
Hardware
| Cisco | Ucs 6248up | - | All | All | All |
Hardware
| Cisco | Ucs 6296up | - | All | All | All |
Hardware
| Cisco | Ucs 6296up | - | All | All | All |
Hardware
| Cisco | Ucs 6324 | - | All | All | All |
Hardware
| Cisco | Ucs 6324 | - | All | All | All |
Hardware
| Cisco | Ucs 6332 | - | All | All | All |
Hardware
| Cisco | Ucs 6332 | - | All | All | All |
Hardware
| Cisco | Ucs 6332-16up | - | All | All | All |
Hardware
| Cisco | Ucs 6332-16up | - | All | All | All |
Hardware
| Cisco | Ucs 64108 | - | All | All | All |
Hardware
| Cisco | Ucs 64108 | - | All | All | All |
Hardware
| Cisco | Ucs 6454 | - | All | All | All |
Hardware
| Cisco | Ucs 6454 | - | All | All | All |
Application | Cisco | Ucs Manager | All | All | All | All |
Application | Cisco | Ucs Manager | All | All | All | All |
- cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_1150:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*:
- cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:ucs_manager:*:*:*:*:*:*:*:*: