A vulnerability in a Virtualization Manager (VMAN) related CLI command of Cisco IOS XE Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root. The vulnerability is due to insufficient validation of arguments passed to a specific VMAN CLI command on the affected device. An attacker who has administrator access to an affected device could exploit this vulnerability by including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the device with root privileges, which may lead to complete system compromise.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ios_xe | Cisco | 15.3(3)s (including) | 15.3(3)s (including) |
Ios_xe | Cisco | 15.4(2)s (including) | 15.4(2)s (including) |
Ios_xe | Cisco | 15.4(3)s (including) | 15.4(3)s (including) |
Ios_xe | Cisco | 15.5(1)s (including) | 15.5(1)s (including) |
Ios_xe | Cisco | 15.5(2)s (including) | 15.5(2)s (including) |
Ios_xe | Cisco | 15.5(3)s (including) | 15.5(3)s (including) |
Ios_xe | Cisco | 15.6(1)s (including) | 15.6(1)s (including) |
Command injection vulnerabilities typically occur when:
Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attacks. Command injection is a common problem with wrapper programs.