// For flags

CVE-2020-3224

Cisco IOS XE Software Web UI Command Injection Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to inject IOS commands to an affected device. The injected commands should require a higher privilege level in order to be executed. The vulnerability is due to insufficient input validation of specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific web UI endpoint on an affected device. A successful exploit could allow the attacker to inject IOS commands to the affected device, which could allow the attacker to alter the configuration of the device or cause a denial of service (DoS) condition.

Una vulnerabilidad en la interfaz de usuario basada en web (UI web) de Cisco IOS XE Software, podría permitir a un atacante remoto autenticado con privilegios de solo lectura inyectar comandos de IOS sobre un dispositivo afectado. Los comandos inyectados deben requerir un nivel de privilegio más alto para poder ser ejecutados. La vulnerabilidad es debido a una comprobación de entrada insuficiente de peticiones HTTP específicas. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones HTTP diseñadas a un endpoint de Interfaz de Usuario web específico sobre un dispositivo afectado. Una explotación con éxito podría permitir al atacante inyectar comandos IOS en el dispositivo afectado, lo que podría permitir al atacante alterar la configuración del dispositivo o causar una condición de denegación de servicio (DoS).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-06-03 CVE Published
  • 2024-07-13 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.11.1
Search vendor "Cisco" for product "Ios Xe" and version "16.11.1"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.11.1a
Search vendor "Cisco" for product "Ios Xe" and version "16.11.1a"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.11.1b
Search vendor "Cisco" for product "Ios Xe" and version "16.11.1b"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.11.1c
Search vendor "Cisco" for product "Ios Xe" and version "16.11.1c"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.11.1s
Search vendor "Cisco" for product "Ios Xe" and version "16.11.1s"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.12.1y
Search vendor "Cisco" for product "Ios Xe" and version "16.12.1y"
-
Affected