// For flags

CVE-2020-3176

Cisco Remote PHY Device Software Command Injection Vulnerability

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in Cisco Remote PHY Device Software could allow an authenticated, local attacker to execute commands on the underlying Linux shell of an affected device with root privileges. The vulnerability exists because the affected software does not properly sanitize user-supplied input. An attacker who has valid administrator access to an affected device could exploit this vulnerability by supplying certain CLI commands with crafted arguments. A successful exploit could allow the attacker to run arbitrary commands as the root user, which could result in a complete system compromise.

Una vulnerabilidad en Cisco Remote PHY Device Software, podría permitir a un atacante local autenticado ejecutar comandos en el shell de Linux subyacente de un dispositivo afectado con privilegios root. La vulnerabilidad se presenta porque el software afectado no sanea apropiadamente la entrada suministrada por el usuario. Un atacante que tenga acceso de administrador válido a un dispositivo afectado podría explotar esta vulnerabilidad al proporcionar determinados comandos de la CLI con argumentos diseñados. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como usuario root, lo que podría resultar en un compromiso completo del sistema.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-03-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Remote Phy 120 Firmware
Search vendor "Cisco" for product "Remote Phy 120 Firmware"
< 7.7
Search vendor "Cisco" for product "Remote Phy 120 Firmware" and version " < 7.7"
-
Affected
in Cisco
Search vendor "Cisco"
Remote Phy 120
Search vendor "Cisco" for product "Remote Phy 120"
--
Safe
Cisco
Search vendor "Cisco"
Remote Phy 220 Firmware
Search vendor "Cisco" for product "Remote Phy 220 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Remote Phy 220
Search vendor "Cisco" for product "Remote Phy 220"
--
Safe
Cisco
Search vendor "Cisco"
Remote Phy Shelf 7200 Firmware
Search vendor "Cisco" for product "Remote Phy Shelf 7200 Firmware"
*-
Affected
in Cisco
Search vendor "Cisco"
Remote Phy Shelf 7200
Search vendor "Cisco" for product "Remote Phy Shelf 7200"
--
Safe