Cisco IOS XR Software for 8000 Series Routers Network Convergence System 540 Series Routers Privilege Escalation (cisco-sa-iosxr-pe-QpzCAePe)

high Nessus Plugin ID 147816
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote device is missing a vendor-supplied security patch


According to its self-reported version, Cisco IOS XR Software for the Cisco 8000 Series Routers and Network Convergence System 540 Series Routers running NCS540L software images is affected by an privilege escalation vulnerability in its CLI command due to insufficient validation of command line arguments. To exploit this vulnerability, an attacker would need to have a valid account on an affected device. An authenticated, local attacker can exploit this vulnerability by authenticating to the device and entering a crafted command at the prompt. A successful exploit could allow an attacker with low-level privileges to escalate their privilege level to root.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvs35027

See Also

Plugin Details

Severity: High

ID: 147816

File Name: cisco-sa-iosxr-pe-QpzCAePe.nasl

Version: 1.10

Type: combined

Family: CISCO

Published: 3/16/2021

Updated: 4/8/2021

Dependencies: cisco_ios_xr_version.nasl, cisco_enum_smu.nasl

Risk Information

CVSS Score Source: CVE-2021-1370


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 2/3/2021

Vulnerability Publication Date: 2/3/2021

Reference Information

CVE: CVE-2021-1370

IAVA: 2021-A-0062


CISCO-SA: cisco-sa-iosxr-pe-QpzCAePe

CWE: 78