QID 317162
Date Published: 2022-04-26
QID 317162: Cisco Internetwork Operating System (IOS) XE Software Tool Command Language Privilege Escalation Vulnerability (cisco-sa-iosxe-priv-esc-grbtubU)
A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software
could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges.
Affected Products
Cisco devices if they were running a vulnerable release of Cisco IOS XE Software and supported the tclsh command.
Note: Devices are not considered vulnerable if they do not support the command or if the command returns an error.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15.
Customers are advised to refer to cisco-sa-iosxe-priv-esc-grbtubU for more information.
- cisco-sa-iosxe-priv-esc-grbtubU -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU
CVEs related to QID 317162
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-iosxe-priv-esc-grbtubU |
|