QID 317287
Date Published: 2023-02-09
QID 317287: Cisco IOx Application Hosting Environment Command Injection Vulnerability (cisco-sa-iox-8whGn5dL)
A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system.
Affected Products
This vulnerability affects Cisco devices that are running Cisco IOS XE Software if they have the Cisco IOx feature enabled and they do not support native docker.
800 Series Industrial ISRs
CGR1000 Compute Modules
IC3000 Industrial Compute Gateways (releases 1.2.1 and later run native docker)
IR510 WPAN Industrial Routers
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
Note: QID has been made practice as this QID does not check for the following things
IC3000 Industrial Compute Gateways
IR510 WPAN Industrial Routers
800 Series Industrial ISRs and CGR1000 Compute Modules fix release versions
A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.
Customers are advised to refer to cisco-sa-iox-8whGn5dL for more information.
- cisco-sa-iox-8whGn5dL -
sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL
CVEs related to QID 317287
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-iox-8whGn5dL |
|