QID 317371

Date Published: 2023-10-17

QID 317371: Cisco IOx Application Hosting Environment Privilege Escalation Vulnerability (cisco-sa-rdocker-uATbukKn)

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.

Affected Products
Catalyst IE3x00 Rugged Series Switches
Catalyst IR1100 Rugged Series Routers
Catalyst IR1800 Rugged Series Routers
Catalyst IR8100 Heavy Duty Series Routers
Catalyst IR8300 Rugged Series Routers
Embedded Services 3300 Series Switches
Note: This QID does not check for the Application Development Workflow

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

An attacker could exploit this vulnerability by using the Docker CLI to access an affected device.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 7.7 severity.
  • Solution

    Customers are advised to refer to cisco-sa-rdocker-uATbukKn for more information.

    CVEs related to QID 317371

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-rdocker-uATbukKn URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rdocker-uATbukKn