7.8
CVSSv3

CVE-2016-6428

Published: 06/10/2016 Updated: 30/07/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the command-line interface (CLI) of IOS-XR series software could allow an authenticated, local malicious user to execute arbitrary code on a targeted system at the root privilege level. The vulnerability is due to incorrect permissions given to a set of users. An attacker could exploit this vulnerability by authenticating to the device and sending crafted user input to execute commands on the underlying operating system. The user has to be logged-in to the device with valid admin credentials. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-iosxr

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios xr 6.1.1

Vendor Advisories

A vulnerability in the command-line interface (CLI) of IOS-XR series software could allow an authenticated, local attacker to execute arbitrary code on a targeted system at the root privilege level The vulnerability is due to incorrect permissions given to a set of users An attacker could exploit this vulnerability by authenticating to the devic ...