QID 317164

Date Published: 2022-05-31

QID 317164: Cisco IOx Application Hosting Environment Multiple Vulnerabilities (cisco-sa-iox-yuXQ6hFj)

Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software.

Affected Products
At the time of publication, one of more of these vulnerabilities affected the following Cisco products if they were running a vulnerable software release:
800 Series Industrial Integrated Services Routers (Industrial ISRs)
800 Series Integrated Services Routers (ISRs)
1000 Series Connected Grid Router (CGR1000) Compute Modules
IC3000 Industrial Compute Gateways
Industrial Ethernet (IE) 4000 Series Switches
IOS XE-based devices configured with IOx
IR510 WPAN Industrial Routers

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

Successful exploit could allow an attacker to inject arbitrary commands into the underlying host operating system

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iox-yuXQ6hFj for more information.

    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iox-yuXQ6hFj URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj