Cisco FXOS Software Command Injection (cisco-sa-fxos-cmdinj-TxcLNZNH)

medium Nessus Plugin ID 168647

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The attacker would need to have Administrator privileges on the device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute commands on the underlying operating system with root privileges.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwc02133

See Also

http://www.nessus.org/u?45540201

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc02133

Plugin Details

Severity: Medium

ID: 168647

File Name: cisco-sa-ftd-fxos-cmd-inj-Q9bLNsrK-fxos.nasl

Version: 1.2

Type: local

Family: CISCO

Published: 12/13/2022

Updated: 12/13/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2022-20934

CVSS v3

Risk Factor: Medium

Base Score: 6.7

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:fxos

Required KB Items: installed_sw/FXOS

Exploit Ease: No known exploits are available

Patch Publication Date: 9/9/2022

Vulnerability Publication Date: 9/9/2022

Reference Information

CVE: CVE-2022-20934

CWE: 77

CISCO-SA: cisco-sa-ftd-fxos-cmd-inj-Q9bLNsrK

IAVA: 2022-A-0486

CISCO-BUG-ID: CSCwc02133