QID 317287

Date Published: 2023-02-09

QID 317287: Cisco IOx Application Hosting Environment Command Injection Vulnerability (cisco-sa-iox-8whGn5dL)

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system.

Affected Products
This vulnerability affects Cisco devices that are running Cisco IOS XE Software if they have the Cisco IOx feature enabled and they do not support native docker.
800 Series Industrial ISRs
CGR1000 Compute Modules
IC3000 Industrial Compute Gateways (releases 1.2.1 and later run native docker)
IR510 WPAN Industrial Routers

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
Note: QID has been made practice as this QID does not check for the following things
IC3000 Industrial Compute Gateways
IR510 WPAN Industrial Routers
800 Series Industrial ISRs and CGR1000 Compute Modules fix release versions

A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 8.3 severity.
  • Solution

    Customers are advised to refer to cisco-sa-iox-8whGn5dL for more information.

    CVEs related to QID 317287

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-iox-8whGn5dL URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL