QID 316697

Date Published: 2023-09-25

QID 316697: Cisco Internetwork Operating System (IOS) XR Software Authenticated User Privilege Escalation Vulnerability (cisco-sa-iosxr-LJtNFjeN)

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local CLI shell user to elevate privileges and gain full administrative control of the device.

Affected Products:
Cisco products if that are running a release of Cisco IOS XR Software Release 5.0.0 or later that is earlier than the first fixed release: 8000 Series Routers IOS XRv 9000 Router IOS XR, SW only Network Convergence System 540 Routers Network Convergence System 560 Routers Network Convergence System 4000 Series Network Convergence System 5500 Series Network Convergence System 6000 Series Routers

QID Detection Logic (Authenticated):
The check matches Cisco IOS XR version retrieved via Unix Auth using "show version" command. Note: This QID does not checks for the workaround and SMU for Network Convergence System 4000 Series. Hence set as a practice

A successful exploit could allow the attacker to elevate privileges and perform actions on the device without authorization checks.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iosxr-LJtNFjeN for more information.Workaround:

    Workarounds exist only for devices that have TACACS+ authentication, authorization, and
    accounting (AAA) command authorization configured. Administrators can use this feature to permit
    access to only the commands that nonadministrative users require and
    deny access to all other commands.

    CVEs related to QID 316697

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iosxr-LJtNFjeN URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-LJtNFjeN