Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ios_xe | Cisco | 16.3.1 (including) | 16.3.1 (including) |
Ios_xe | Cisco | 16.3.1a (including) | 16.3.1a (including) |
Ios_xe | Cisco | 16.3.2 (including) | 16.3.2 (including) |
Ios_xe | Cisco | 16.3.3 (including) | 16.3.3 (including) |
Ios_xe | Cisco | 16.3.4 (including) | 16.3.4 (including) |
Ios_xe | Cisco | 16.3.5 (including) | 16.3.5 (including) |
Ios_xe | Cisco | 16.3.5b (including) | 16.3.5b (including) |
Ios_xe | Cisco | 16.3.6 (including) | 16.3.6 (including) |
Ios_xe | Cisco | 16.3.7 (including) | 16.3.7 (including) |
Ios_xe | Cisco | 16.3.8 (including) | 16.3.8 (including) |
Ios_xe | Cisco | 16.3.9 (including) | 16.3.9 (including) |
Ios_xe | Cisco | 16.3.10 (including) | 16.3.10 (including) |
Ios_xe | Cisco | 16.3.11 (including) | 16.3.11 (including) |
Ios_xe | Cisco | 16.4.1 (including) | 16.4.1 (including) |
Ios_xe | Cisco | 16.4.2 (including) | 16.4.2 (including) |
Ios_xe | Cisco | 16.4.3 (including) | 16.4.3 (including) |
Ios_xe | Cisco | 16.5.1 (including) | 16.5.1 (including) |
Ios_xe | Cisco | 16.5.1a (including) | 16.5.1a (including) |
Ios_xe | Cisco | 16.5.1b (including) | 16.5.1b (including) |
Ios_xe | Cisco | 16.5.2 (including) | 16.5.2 (including) |
Ios_xe | Cisco | 16.5.3 (including) | 16.5.3 (including) |
Ios_xe | Cisco | 16.6.1 (including) | 16.6.1 (including) |
Ios_xe | Cisco | 16.6.2 (including) | 16.6.2 (including) |
Ios_xe | Cisco | 16.6.3 (including) | 16.6.3 (including) |
Ios_xe | Cisco | 16.6.4 (including) | 16.6.4 (including) |
Ios_xe | Cisco | 16.6.4a (including) | 16.6.4a (including) |
Ios_xe | Cisco | 16.6.4s (including) | 16.6.4s (including) |
Ios_xe | Cisco | 16.6.5 (including) | 16.6.5 (including) |
Ios_xe | Cisco | 16.6.5a (including) | 16.6.5a (including) |
Ios_xe | Cisco | 16.6.5b (including) | 16.6.5b (including) |
Ios_xe | Cisco | 16.6.6 (including) | 16.6.6 (including) |
Ios_xe | Cisco | 16.6.7 (including) | 16.6.7 (including) |
Ios_xe | Cisco | 16.6.7a (including) | 16.6.7a (including) |
Ios_xe | Cisco | 16.6.8 (including) | 16.6.8 (including) |
Ios_xe | Cisco | 16.6.9 (including) | 16.6.9 (including) |
Ios_xe | Cisco | 16.6.10 (including) | 16.6.10 (including) |
Ios_xe | Cisco | 16.7.1 (including) | 16.7.1 (including) |
Ios_xe | Cisco | 16.7.1a (including) | 16.7.1a (including) |
Ios_xe | Cisco | 16.7.1b (including) | 16.7.1b (including) |
Ios_xe | Cisco | 16.7.2 (including) | 16.7.2 (including) |
Ios_xe | Cisco | 16.7.3 (including) | 16.7.3 (including) |
Ios_xe | Cisco | 16.7.4 (including) | 16.7.4 (including) |
Ios_xe | Cisco | 16.8.1 (including) | 16.8.1 (including) |
Ios_xe | Cisco | 16.8.1a (including) | 16.8.1a (including) |
Ios_xe | Cisco | 16.8.1b (including) | 16.8.1b (including) |
Ios_xe | Cisco | 16.8.1c (including) | 16.8.1c (including) |
Ios_xe | Cisco | 16.8.1d (including) | 16.8.1d (including) |
Ios_xe | Cisco | 16.8.1e (including) | 16.8.1e (including) |
Ios_xe | Cisco | 16.8.1s (including) | 16.8.1s (including) |
Ios_xe | Cisco | 16.8.2 (including) | 16.8.2 (including) |
Ios_xe | Cisco | 16.8.3 (including) | 16.8.3 (including) |
Ios_xe | Cisco | 16.9.1 (including) | 16.9.1 (including) |
Ios_xe | Cisco | 16.9.1a (including) | 16.9.1a (including) |
Ios_xe | Cisco | 16.9.1b (including) | 16.9.1b (including) |
Ios_xe | Cisco | 16.9.1c (including) | 16.9.1c (including) |
Ios_xe | Cisco | 16.9.1d (including) | 16.9.1d (including) |
Ios_xe | Cisco | 16.9.1s (including) | 16.9.1s (including) |
Ios_xe | Cisco | 16.9.2 (including) | 16.9.2 (including) |
Ios_xe | Cisco | 16.9.2a (including) | 16.9.2a (including) |
Ios_xe | Cisco | 16.9.2s (including) | 16.9.2s (including) |
Ios_xe | Cisco | 16.9.3 (including) | 16.9.3 (including) |
Ios_xe | Cisco | 16.9.3a (including) | 16.9.3a (including) |
Ios_xe | Cisco | 16.9.3h (including) | 16.9.3h (including) |
Ios_xe | Cisco | 16.9.3s (including) | 16.9.3s (including) |
Ios_xe | Cisco | 16.9.4 (including) | 16.9.4 (including) |
Ios_xe | Cisco | 16.9.4c (including) | 16.9.4c (including) |
Ios_xe | Cisco | 16.9.5 (including) | 16.9.5 (including) |
Ios_xe | Cisco | 16.9.5f (including) | 16.9.5f (including) |
Ios_xe | Cisco | 16.9.6 (including) | 16.9.6 (including) |
Ios_xe | Cisco | 16.9.7 (including) | 16.9.7 (including) |
Ios_xe | Cisco | 16.9.8 (including) | 16.9.8 (including) |
Ios_xe | Cisco | 16.10.1 (including) | 16.10.1 (including) |
Ios_xe | Cisco | 16.10.1a (including) | 16.10.1a (including) |
Ios_xe | Cisco | 16.10.1b (including) | 16.10.1b (including) |
Ios_xe | Cisco | 16.10.1c (including) | 16.10.1c (including) |
Ios_xe | Cisco | 16.10.1d (including) | 16.10.1d (including) |
Ios_xe | Cisco | 16.10.1e (including) | 16.10.1e (including) |
Ios_xe | Cisco | 16.10.1f (including) | 16.10.1f (including) |
Ios_xe | Cisco | 16.10.1g (including) | 16.10.1g (including) |
Ios_xe | Cisco | 16.10.1s (including) | 16.10.1s (including) |
Ios_xe | Cisco | 16.10.2 (including) | 16.10.2 (including) |
Ios_xe | Cisco | 16.10.3 (including) | 16.10.3 (including) |
Ios_xe | Cisco | 16.11.1 (including) | 16.11.1 (including) |
Ios_xe | Cisco | 16.11.1a (including) | 16.11.1a (including) |
Ios_xe | Cisco | 16.11.1b (including) | 16.11.1b (including) |
Ios_xe | Cisco | 16.11.1c (including) | 16.11.1c (including) |
Ios_xe | Cisco | 16.11.1s (including) | 16.11.1s (including) |
Ios_xe | Cisco | 16.11.2 (including) | 16.11.2 (including) |
Ios_xe | Cisco | 16.12.1 (including) | 16.12.1 (including) |
Ios_xe | Cisco | 16.12.1a (including) | 16.12.1a (including) |
Ios_xe | Cisco | 16.12.1c (including) | 16.12.1c (including) |
Ios_xe | Cisco | 16.12.1s (including) | 16.12.1s (including) |
Ios_xe | Cisco | 16.12.1t (including) | 16.12.1t (including) |
Ios_xe | Cisco | 16.12.1w (including) | 16.12.1w (including) |
Ios_xe | Cisco | 16.12.1x (including) | 16.12.1x (including) |
Ios_xe | Cisco | 16.12.1y (including) | 16.12.1y (including) |
Ios_xe | Cisco | 16.12.2 (including) | 16.12.2 (including) |
Ios_xe | Cisco | 16.12.2a (including) | 16.12.2a (including) |
Ios_xe | Cisco | 16.12.2s (including) | 16.12.2s (including) |
Ios_xe | Cisco | 16.12.2t (including) | 16.12.2t (including) |
Ios_xe | Cisco | 16.12.3 (including) | 16.12.3 (including) |
Ios_xe | Cisco | 16.12.3a (including) | 16.12.3a (including) |
Ios_xe | Cisco | 16.12.3s (including) | 16.12.3s (including) |
Ios_xe | Cisco | 16.12.4 (including) | 16.12.4 (including) |
Ios_xe | Cisco | 16.12.4a (including) | 16.12.4a (including) |
Ios_xe | Cisco | 16.12.5 (including) | 16.12.5 (including) |
Ios_xe | Cisco | 16.12.5a (including) | 16.12.5a (including) |
Ios_xe | Cisco | 17.1.1 (including) | 17.1.1 (including) |
Ios_xe | Cisco | 17.1.1a (including) | 17.1.1a (including) |
Ios_xe | Cisco | 17.1.1s (including) | 17.1.1s (including) |
Ios_xe | Cisco | 17.1.1t (including) | 17.1.1t (including) |
Ios_xe | Cisco | 17.1.2 (including) | 17.1.2 (including) |
Ios_xe | Cisco | 17.1.3 (including) | 17.1.3 (including) |
Ios_xe | Cisco | 17.2.1 (including) | 17.2.1 (including) |
Ios_xe | Cisco | 17.2.1a (including) | 17.2.1a (including) |
Ios_xe | Cisco | 17.2.1r (including) | 17.2.1r (including) |
Ios_xe | Cisco | 17.2.1v (including) | 17.2.1v (including) |
Ios_xe | Cisco | 17.2.2 (including) | 17.2.2 (including) |
Ios_xe | Cisco | 17.2.3 (including) | 17.2.3 (including) |
Ios_xe | Cisco | 17.3.1 (including) | 17.3.1 (including) |
Ios_xe | Cisco | 17.3.1a (including) | 17.3.1a (including) |
Ios_xe | Cisco | 17.3.2 (including) | 17.3.2 (including) |
Ios_xe | Cisco | 17.3.2a (including) | 17.3.2a (including) |
Ios_xe | Cisco | 17.3.3 (including) | 17.3.3 (including) |
Ios_xe | Cisco | 17.3.3a (including) | 17.3.3a (including) |
Ios_xe | Cisco | 17.3.4 (including) | 17.3.4 (including) |
Ios_xe | Cisco | 17.3.4a (including) | 17.3.4a (including) |
Ios_xe | Cisco | 17.3.4b (including) | 17.3.4b (including) |
Ios_xe | Cisco | 17.3.4c (including) | 17.3.4c (including) |
Ios_xe | Cisco | 17.4.1 (including) | 17.4.1 (including) |
Ios_xe | Cisco | 17.4.1a (including) | 17.4.1a (including) |
Ios_xe | Cisco | 17.4.1b (including) | 17.4.1b (including) |
Ios_xe | Cisco | 17.4.1c (including) | 17.4.1c (including) |
Ios_xe | Cisco | 17.4.2 (including) | 17.4.2 (including) |
Ios_xe | Cisco | 17.4.2a (including) | 17.4.2a (including) |
Ios_xe | Cisco | 17.5.1 (including) | 17.5.1 (including) |
Ios_xe | Cisco | 17.5.1a (including) | 17.5.1a (including) |
Ios_xe | Cisco | 17.6.1 (including) | 17.6.1 (including) |
Ios_xe | Cisco | 17.6.1a (including) | 17.6.1a (including) |
This could allow attackers to execute unexpected, dangerous commands directly on the operating system. This weakness can lead to a vulnerability in environments in which the attacker does not have direct access to the operating system, such as in web applications. Alternately, if the weakness occurs in a privileged program, it could allow the attacker to specify commands that normally would not be accessible, or to call alternate commands with privileges that the attacker does not have. The problem is exacerbated if the compromised process does not follow the principle of least privilege, because the attacker-controlled commands may run with special system privileges that increases the amount of damage. There are at least two subtypes of OS command injection:
From a weakness standpoint, these variants represent distinct programmer errors. In the first variant, the programmer clearly intends that input from untrusted parties will be part of the arguments in the command to be executed. In the second variant, the programmer does not intend for the command to be accessible to any untrusted party, but the programmer probably has not accounted for alternate ways in which malicious attackers can provide input.