A vulnerability in the processing of boot options of specific Cisco IOS XE Software switches could allow an authenticated, local attacker with root shell access to the underlying operating system (OS) to conduct a command injection attack during device boot. This vulnerability is due to insufficient input validation checks while processing boot options. An attacker could exploit this vulnerability by modifying device boot options to execute attacker-provided code. A successful exploit may allow an attacker to bypass the Secure Boot process and execute malicious code on an affected device with root-level privileges.
History

Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2020-06-03T17:40:40.504552Z

Updated: 2024-11-15T17:18:45.307Z

Reserved: 2019-12-12T00:00:00

Link: CVE-2020-3207

cve-icon Vulnrichment

Updated: 2024-08-04T07:24:00.749Z

cve-icon NVD

Status : Modified

Published: 2020-06-03T18:15:18.747

Modified: 2024-11-21T05:30:33.603

Link: CVE-2020-3207

cve-icon Redhat

No data.