QID 317307

Date Published: 2023-03-29

QID 317307: Cisco Internetwork Operating System (IOS XE) Software Secure Boot Bypass Vulnerability (cisco-sa-c9300-spi-ace-yejYgnNQ)

A vulnerability in Cisco IOS XE Software for Cisco Catalyst 9300 Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.

Affected Releases

This vulnerability affects Cisco Catalyst 9300 Series Switches if they are running Cisco IOS XE Software with a release of Cisco IOS XE ROM Monitor (ROMMON) that is earlier than Release 17.3.7r, Release 17.6.5r, or Release 17.8.1r.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to execute persistent code on the underlying operating system.

  • CVSS V3 rated as High - 6.8 severity.
  • CVSS V2 rated as High - 6.6 severity.
  • Solution

    Customers are advised to refer to cisco-sa-VU855201-J3z8CKTX for more information.

    CVEs related to QID 317307

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-c9300-spi-ace-yejYgnNQ URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9300-spi-ace-yejYgnNQ