QID 316905

Date Published: 2021-03-26

QID 316905: Cisco IOS and IOS XE Software Common Industrial Protocol Privilege Escalation Vulnerability(cisco-sa-XE-SAP-OPLbze68)

A vulnerability in the CLI command permissions of Cisco IOS and Cisco IOS XE Software could
allow an authenticated, local attacker to retrieve the password for
Common Industrial Protocol (CIP) and then remotely configure the device as an administrative user.

Affected Products
Cisco devices if they are running a vulnerable release of Cisco IOS or Cisco IOS XE Software and have CIP enabled. CIP is not enabled by default.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to reconfigure the device.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Low - 2.1 severity.
  • Solution

    Customers are advised to refer to cisco-sa-XE-SAP-OPLbze68 for more information.

    CVEs related to QID 316905

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-XE-SAP-OPLbze68 URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-XE-SAP-OPLbze68