A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files. The attacker would need valid administrative credentials. This vulnerability is due to improper input validation of CLI command arguments. An attacker could exploit this vulnerability by using path traversal techniques when executing a vulnerable command. A successful exploit could allow the attacker to gain root shell access to the underlying operating system and overwrite or read arbitrary files on an affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-ptrav-SHMzzwVR | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-06-18 03:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-3236
Mitre link : CVE-2020-3236
CVE.ORG link : CVE-2020-3236
JSON object : View
Products Affected
cisco
- enterprise_network_function_virtualization_infrastructure
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')