Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to inject arbitrary commands into the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell of an affected device and execute commands with root privileges on the device. The vulnerabilities exist because the affected software does not sufficiently sanitize command arguments before passing commands to the Linux shell for execution. An attacker could exploit these vulnerabilities by submitting a malicious CLI command to the affected software. A successful exploit could allow the attacker to break from the CLI of the affected software, which could allow the attacker to gain access to the underlying Linux shell on an affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCuz03145, CSCuz56419, CSCva31971, CSCvb09542.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103547 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-cmdinj | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2018-03-28 22:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-0182
Mitre link : CVE-2018-0182
CVE.ORG link : CVE-2018-0182
JSON object : View
Products Affected
cisco
- ios_xe
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')