Vulnslist

find the latest Cisco vulnerabilities

Cisco IOS XR Software SSH Privilege Escalation Vulnerability

cisco-sa-iosxr-ssh-privesc-eWDMKew3 · High · Published · Updated

A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device.  This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3 This advisory is part of the March 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

However, as a mitigation, customers who have configured authentication, authorization, and accounting (AAA) services to provide command authorization may restrict access to the ssh command in the authorization policy that is defined on their AAA server.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2024-20320
Cisco Bug IDsCSCwh52374
CVSS ScoreBase 7.8
Base 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XR Software

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2024-20320 Cisco OpenVuln
Cisco Network Convergence System 540 Series CVE-2024-20320 Cisco OpenVuln
Cisco IOS Software CVE-2024-20320 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2024-20320 Cisco OpenVuln
Cisco 8000 Series Routers CVE-2024-20320 Cisco OpenVuln
Cisco 5700 Series Routers CVE-2024-20320 Cisco OpenVuln
Cisco IOS XR Software CVE-2024-20320 Cisco OpenVuln
Cisco IOS CVE-2024-20320 Cisco OpenVuln