9
CVSSv2

CVE-2020-3224

Published: 03/06/2020 Updated: 10/06/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to inject IOS commands to an affected device. The injected commands should require a higher privilege level in order to be executed. The vulnerability is due to insufficient input validation of specific HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a specific web UI endpoint on an affected device. A successful exploit could allow the malicious user to inject IOS commands to the affected device, which could allow the malicious user to alter the configuration of the device or cause a denial of service (DoS) condition.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios xe 16.11.1

cisco ios xe 16.11.1a

cisco ios xe 16.11.1b

cisco ios xe 16.11.1c

cisco ios xe 16.11.1s

cisco ios xe 16.12.1y

Vendor Advisories

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an authenticated, remote attacker with read-only privileges to inject IOS commands to an affected device The injected commands should require a higher privilege level in order to be executed The vulnerability is due to insufficient input validation of s ...