QID 317162

Date Published: 2022-04-26

QID 317162: Cisco Internetwork Operating System (IOS) XE Software Tool Command Language Privilege Escalation Vulnerability (cisco-sa-iosxe-priv-esc-grbtubU)

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software
could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges.

Affected Products
Cisco devices if they were running a vulnerable release of Cisco IOS XE Software and supported the tclsh command.
Note: Devices are not considered vulnerable if they do not support the command or if the command returns an error.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15.

  • CVSS V3 rated as High - 6.7 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iosxe-priv-esc-grbtubU for more information.

    CVEs related to QID 317162

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iosxe-priv-esc-grbtubU URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU