CVE-2020-3224
Cisco IOS XE Software Web UI Command Injection Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to inject IOS commands to an affected device. The injected commands should require a higher privilege level in order to be executed. The vulnerability is due to insufficient input validation of specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific web UI endpoint on an affected device. A successful exploit could allow the attacker to inject IOS commands to the affected device, which could allow the attacker to alter the configuration of the device or cause a denial of service (DoS) condition.
Una vulnerabilidad en la interfaz de usuario basada en web (UI web) de Cisco IOS XE Software, podría permitir a un atacante remoto autenticado con privilegios de solo lectura inyectar comandos de IOS sobre un dispositivo afectado. Los comandos inyectados deben requerir un nivel de privilegio más alto para poder ser ejecutados. La vulnerabilidad es debido a una comprobación de entrada insuficiente de peticiones HTTP específicas. Un atacante podría explotar esta vulnerabilidad mediante el envío de peticiones HTTP diseñadas a un endpoint de Interfaz de Usuario web específico sobre un dispositivo afectado. Una explotación con éxito podría permitir al atacante inyectar comandos IOS en el dispositivo afectado, lo que podría permitir al atacante alterar la configuración del dispositivo o causar una condición de denegación de servicio (DoS).
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2019-12-12 CVE Reserved
- 2020-06-03 CVE Published
- 2024-07-13 EPSS Updated
- 2024-11-15 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-zM283Zdw | 2020-06-10 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.11.1 Search vendor "Cisco" for product "Ios Xe" and version "16.11.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.11.1a Search vendor "Cisco" for product "Ios Xe" and version "16.11.1a" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.11.1b Search vendor "Cisco" for product "Ios Xe" and version "16.11.1b" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.11.1c Search vendor "Cisco" for product "Ios Xe" and version "16.11.1c" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.11.1s Search vendor "Cisco" for product "Ios Xe" and version "16.11.1s" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | 16.12.1y Search vendor "Cisco" for product "Ios Xe" and version "16.12.1y" | - |
Affected
|