6.9
CVSSv2

CVE-2015-4185

Published: 13/06/2015 Updated: 04/01/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the Tool Command Language (TCL) script interpreter of Cisco IOS Software could allow an authenticated, local malicious user to escalate privileges from those of a non-privileged user to a privileged (level 15) user. This would allow a non-privileged user to execute privileged commands (those under privilege level 15). The vulnerability is due to an error when resetting vty privileges after running a TCL script. An attacker could exploit this vulnerability by establishing a session with an affected device immediately after a TCL script has been run. An attacker would need to provide valid credentials and successfully pass authentication to the device. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements could reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.2\\(4\\)m6

cisco ios 15.2m

Vendor Advisories

A vulnerability in the Tool Command Language (TCL) script interpreter of Cisco IOS Software could allow an authenticated, local attacker to escalate privileges from those of a non-privileged user to a privileged (level 15) user This would allow a non-privileged user to execute privileged commands (those under privilege level 15) The vulnerabilit ...