For more information, see the Details section of this advisory.įor information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. However, whether the device is exploitable is dependent on how the TACACS+ profiles for each user are configured. This vulnerability affects Cisco products if they are running a vulnerable release of Cisco IOS Software or Cisco IOS XE Software (in either autonomous mode or controller mode) and have both SCP server functionality and AAA command authorization enabled. For a complete list of the advisories and links to them, see Cisco Event Response: September 2023 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. This advisory is part of the September 2023 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. This advisory is available at the following link: There are workarounds that address this vulnerability. A successful exploit could allow the attacker to obtain or change the configuration of the affected device and put files on or retrieve files from the affected device.Ĭisco has released software updates that address this vulnerability. An attacker with valid credentials and level 15 privileges could exploit this vulnerability by using SCP to connect to an affected device from an external machine. This vulnerability is due to incorrect processing of SCP commands in AAA command authorization checks. A vulnerability in the Authentication, Authorization, and Accounting (AAA) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to bypass command authorization and copy files to or from the file system of an affected device using the Secure Copy Protocol (SCP).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |