QID 316785
Date Published: 2023-09-27
QID 316785: Cisco Internetwork Operating System (IOS) XR Authenticated User Privilege Escalation Vulnerability (cisco-sa-iosxr-cli-privescl-sDVEmhqv)
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to execute that command, even though administrative privileges should be required.
The attacker must have valid credentials on the affected device.
Affected Products
Cisco products if they are running a vulnerable release of Cisco IOS XR Software:
ASR 9000 Series Aggregation Services Routers (32-bit and 64-bit models)
IOS XR, SW only
Network Convergence System 1000 Series
Network Convergence System 5000 Series
Network Convergence System 5500 Series
QID Detection Logic (Authenticated):
The check matches Cisco IOS XR version retrieved via Unix Auth using "show version" command.
NOTE: This QID does not checks for Workaround and SMU AA17739/AA17740 Hence set as Practice.
A successful exploit could allow the attacker to invalidate the integrity of the disk and cause the device to restart. This vulnerability could allow a user with read permissions to issue a specific command that should require Administrator privileges.
Customers are advised to refer to cisco-sa-iosxr-cli-privescl-sDVEmhqv for more information.
- cisco-sa-iosxr-cli-privescl-sDVEmhqv -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-cli-privescl-sDVEmhqv
CVEs related to QID 316785
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-iosxr-cli-privescl-sDVEmhqv |
|