Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-3530— Cisco IOS XR Authenticated User Privilege Escalation Vulnerability

CVSS 8.4 · High EPSS 0.03% · P9
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-3530

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco IOS XR Authenticated User Privilege Escalation Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to execute that command, even though administrative privileges should be required. The attacker must have valid credentials on the affected device. The vulnerability is due to incorrect mapping in the source code of task group assignments for a specific command. An attacker could exploit this vulnerability by issuing the command, which they should not be authorized to issue, on an affected device. A successful exploit could allow the attacker to invalidate the integrity of the disk and cause the device to restart. This vulnerability could allow a user with read permissions to issue a specific command that should require Administrator privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
权限、特权和访问控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco?IOS XR 权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco IOS和Cisco IOS XR都是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。 Cisco IOS XR软件中的CLI存在权限许可和访问控制问题漏洞,该漏洞源于网络系统或产品缺乏有效的权限许可和访问控制措施。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco IOS XR Software n/a -

II. Public POCs for CVE-2020-3530

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-3530

登录查看更多情报信息。

Same Patch Batch · Cisco · 2020-09-04 · 15 CVEs total

CVE-2020-34959.9 CRITICALCisco Jabber for Windows Message Handling Arbitrary Code Execution Vulnerability
CVE-2020-34308.8 HIGHCisco Jabber for Windows Protocol Handler Command Injection Vulnerability
CVE-2020-34788.1 HIGHCisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability
CVE-2020-34986.5 MEDIUMCisco Jabber for Windows Information Disclosure Vulnerability
CVE-2020-35456.0 MEDIUMCisco FXOS Software Buffer Overflow Vulnerability
CVE-2020-35375.7 MEDIUMCisco Jabber for Windows Universal Naming Convention Link Handling Vulnerability
CVE-2020-35425.3 MEDIUMCisco Webex Training Unauthorized Meeting Join Vulnerability
CVE-2020-34514.7 MEDIUMCisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vuln
CVE-2020-34534.7 MEDIUMCisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vuln
CVE-2020-35414.4 MEDIUMCisco Webex Meetings Client for Windows, Webex Meetings Desktop App, and Webex Teams Infor
CVE-2020-35474.3 MEDIUMCisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web
CVE-2020-33654.3 MEDIUMCisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability
CVE-2020-3473Cisco IOS XR Software Authenticated User Privilege Escalation Vulnerability
CVE-2020-3546Cisco Email Security Appliance Information Disclosure Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2020-3530

No comments yet


Leave a comment