Cisco IOS XR 6.0.1.x and 6.0.2.x < / 6.1.x < Command Input Handling Privilege Escalation

high Nessus Plugin ID 92948


The remote device is missing a vendor-supplied security patch.


The version of Cisco IOS XR running on the remote device is 6.0.1.x or 6.0.2.x prior to, or 6.1.x prior to It is, therefore, affected by a privilege escalation vulnerability in the command-line utility due to improper validation of user-supplied input. A local attacker can exploit this, via crafted input to a command within a specific container, to execute arbitrary commands with root privileges.


Upgrade to the relevant fixed version referenced in Cisco bug ID CSCuz62721.

See Also

Plugin Details

Severity: High

ID: 92948

File Name: cisco-sa-20160714-iosxr.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 8/12/2016

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-1456


Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/14/2016

Vulnerability Publication Date: 7/14/2016

Reference Information

CVE: CVE-2016-1456

BID: 91785

CISCO-SA: cisco-sa-20160714-ios-xr