fkie_cve-2024-20320
Vulnerability from fkie_nvd
Published
2024-03-13 17:15
Modified
2025-08-05 14:40
Summary
A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device.
Impacted products
Vendor Product Version
cisco ios_xr 7.2.1
cisco ios_xr 7.2.2
cisco ios_xr 7.3.1
cisco ios_xr 7.3.2
cisco ios_xr 7.3.3
cisco ios_xr 7.3.5
cisco ios_xr 7.3.15
cisco ios_xr 7.4.1
cisco ios_xr 7.4.2
cisco ios_xr 7.5.1
cisco ios_xr 7.5.2
cisco ios_xr 7.5.3
cisco ios_xr 7.5.4
cisco ios_xr 7.5.5
cisco ios_xr 7.6.1
cisco ios_xr 7.6.2
cisco ios_xr 7.7.1
cisco ios_xr 7.7.2
cisco ios_xr 7.7.21
cisco ios_xr 7.8.1
cisco ios_xr 7.8.2
cisco ios_xr 7.9.1
cisco ios_xr 7.9.2
cisco ios_xr 7.9.21
cisco ios_xr 7.10.1
cisco ios_xrd_control_plane *
cisco ios_xrd_vrouter *
cisco 8011-4g24y4h-i -
cisco 8101-32fh -
cisco 8101-32fh-o -
cisco 8101-32h-o -
cisco 8102-28fh-dpu-o -
cisco 8102-64h -
cisco 8102-64h-o -
cisco 8111-32eh-o -
cisco 8122-64eh-o -
cisco 8122-64ehf-o -
cisco 8201 -
cisco 8201-24h8fh -
cisco 8201-32fh -
cisco 8201-32fh-o -
cisco 8202 -
cisco 8202-32fh-m -
cisco 8212-48fh-m -
cisco 8404 -
cisco 8501-sys-mt -
cisco 8608 -
cisco 8700 -
cisco 8711-32fh-m -
cisco 8712-mod-m -
cisco 8804 -
cisco 8808 -
cisco 8812 -
cisco 8818 -
cisco ncs_540-12z20g-sys-a -
cisco ncs_540-12z20g-sys-d -
cisco ncs_540-24q2c2dd-sys -
cisco ncs_540-24q8l2dd-sys -
cisco ncs_540-24z8q2c-sys -
cisco ncs_540-28z4c-sys-a -
cisco ncs_540-28z4c-sys-d -
cisco ncs_540-6z14s-sys-d -
cisco ncs_540-6z18g-sys-a -
cisco ncs_540-6z18g-sys-d -
cisco ncs_540-acc-sys -
cisco ncs_540-fh-agg -
cisco ncs_540-fh-csr-sys -
cisco ncs_540x-12z16g-sys-a -
cisco ncs_540x-12z16g-sys-d -
cisco ncs_540x-16z4g8q2c-a -
cisco ncs_540x-16z4g8q2c-d -
cisco ncs_540x-16z8q2c-d -
cisco ncs_540x-4z14g2q-a -
cisco ncs_540x-4z14g2q-d -
cisco ncs_540x-6z18g-sys-a -
cisco ncs_540x-6z18g-sys-d -
cisco ncs_540x-8z16g-sys-a -
cisco ncs_540x-8z16g-sys-d -
cisco ncs_540x-acc-sys -
cisco ncs_57b1-5dse-sys -
cisco ncs_57b1-6d24-sys -
cisco ncs_57c1-48q6-sys -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FE3667-1B5E-48FB-B3BB-1C1854FFEE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0370A9-E422-4109-81A3-DE2118A20827",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CD7F68-9569-43F4-88ED-96F9A15C065D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C4C062-F816-41FE-ADAD-F994F4FA4A07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07E9C56-D143-45FA-99FF-30F54A828BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB9D0641-28F8-4CCB-AEC3-205409D1704A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "D21DEFD5-EC43-496B-BBE1-C71C6055BC04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "40C6D7C4-A5D9-4365-9664-EF35586925AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC41A004-2029-4E22-A88F-2B93D9786B6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57F7D7FD-24A8-4DD4-8280-A18244059F34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7448D1-BC19-45AB-BF6F-3434F8CA2CC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A057808-1BCA-4C7C-A2D9-0BD5B09D20F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D09FC0-73C5-4F7A-8013-0B0E5CC834FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA4A8AF-348D-4F90-B1CB-AE784E0A6EBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C95648D-A37A-446B-B106-12612C00A34D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF31489-C029-4D4C-8401-26873FC469E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1807BE16-BAA9-4BC6-B98A-13D584A12821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "375746CB-695E-4019-89C9-42ED37A5E958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE7D05C0-4065-448B-AAC6-F29E379F3DA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8ADA2B1-FD5A-4900-953B-30951C8EF9AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B4C7223-3EFB-48C2-BE22-941F60826D0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "164B241C-397A-4921-BC5B-F928A21E91C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD3875D-D283-4961-BE31-750FDF9CDF56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEC28C0-8091-49F9-88D1-CB96234BF52A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:ios_xrd_control_plane:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E05A05E-C9A5-40E1-A205-62EE00AF1EAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:cisco:ios_xrd_vrouter:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "546F18E0-335C-4841-A0A5-32CAD2DDE7BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8011-4g24y4h-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C422517-1BC8-4BCE-97E8-A2C165C7BB64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E055F58F-F9FB-4B27-841E-61ECAB5F42B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8101-32fh-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "437EBDAF-0633-409C-9EA4-DAD099D553B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8101-32h-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8153C555-9AF4-4793-8F27-B01F1B3D76B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8102-28fh-dpu-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0229018-3C4A-4174-B50F-F352FB1CCF9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8102-64h-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B14EC7C-4916-49C8-B919-E0149A4C44BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8111-32eh-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0443E9-9309-4503-9D21-ED5359F87E71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8122-64eh-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9911F911-E322-4B0F-B31A-8FDA80D7AE5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8122-64ehf-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA5968D-7167-4D7D-A055-6F3C8023B496",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8201-24h8fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A554611-6B1B-482E-AF77-CD032EA7A978",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8201-32fh-o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "321767C3-BEBB-4A70-A4BF-4EED7E6669D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8202-32fh-m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17EF50F5-0A9F-4649-BEBB-1F181E27C5B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8212-48fh-m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AB5F5A-2346-4F4B-A6ED-1884C5BE9353",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8404:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540DCD6A-722D-4173-8046-885FEFA23A14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8501-sys-mt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A5A74F-458A-4D51-B487-949E637E58AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B8D161-2D5E-4BD8-9518-B2FAB73ADEEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "115B1C4A-A508-4F22-8E15-545AB4301017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8711-32fh-m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4DF4211-FC4B-4A4A-9154-D64F0B84EEA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8712-mod-m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3432E52B-6914-4DF2-8D7C-C19A435BF542",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6655851F-58D9-49D9-A56E-8440A7F7BB45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5E2AE67-DED3-4414-A194-386ADB2C8DC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3920133A-684D-4A9F-B65A-FF4EAE5052E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED06361-5A68-4656-AEA5-240C290594CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5494B4B-0BB4-48AE-8B0D-04DE649F9313",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A0C835-6C98-4AB6-89FF-C27117BB6B12",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24550EBB-6FEE-4916-B58A-5FD8E45E962B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAD71DBE-AE18-49FA-826E-52D87A73F496",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "395F25CD-FDF5-48D7-A048-A6B4F4779EC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E926BBC-F5C5-4D02-8A62-F1A5DE3C54DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB1323A-C472-4EA1-A969-1D1C10AB0CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A64FB4E3-4393-4A89-B6FB-E990D33427C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E585D1-F2E7-4CBE-ACA2-6552ACDF492A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44BB03A0-9152-444B-B5CD-70F4CBD53D03",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "124CE49C-1C2B-40A5-8F59-7A223766E12F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D7DFE35-76BA-4BAE-9C4B-0625DAE573B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1645EAA7-0847-4418-BA9B-FA8E36B59626",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83F3D33-0674-4F74-AEA9-BC824D8536F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "784A450D-8DCA-43E5-8044-A9F2363FB006",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E88ED4-C2AF-407C-A395-3D7806D68758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA11E43-F821-45F6-A2DB-E1EBC8BDE68B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A93F10D9-CF79-4DF2-964C-D423D1C1D993",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52A23CF-2D33-46CD-9784-D54826F63C71",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB9BD2FE-BADB-489F-B832-2EF53F8679E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42610AAA-9830-44C3-8D1D-2433FCA0541B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31CE816F-858C-421A-99D1-FCD4BB5FAD47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4A522F-560C-438D-AB68-BF0175C06F78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A405E23C-24BC-42C8-99DB-D8E5EFD98261",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "871D84C5-71EE-4B82-A48C-A1CC68DA332A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EEDD1C-25BC-4AFA-AF60-66DE36927528",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD3B06B-864E-4A35-B0C3-1654390022D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1B4F37-5AAA-4F40-8865-226289CB5CEB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the SSH client feature of Cisco IOS XR Software for Cisco 8000 Series Routers and Cisco Network Convergence System (NCS) 540 Series and 5700 Series Routers could allow an authenticated, local attacker to elevate privileges on an affected device. \r\n\r This vulnerability is due to insufficient validation of arguments that are included with the SSH client CLI command. An attacker with low-privileged access to an affected device could exploit this vulnerability by issuing a crafted SSH client command to the CLI. A successful exploit could allow the attacker to elevate privileges to root on the affected device."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funci\u00f3n de cliente SSH del software Cisco IOS XR para los enrutadores Cisco de la serie 8000 y los enrutadores Cisco Network Convergence System (NCS) de las series 540 y 5700 podr\u00eda permitir que un atacante local autenticado eleve los privilegios en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los argumentos que se incluyen con el comando CLI del cliente SSH. Un atacante con acceso con pocos privilegios a un dispositivo afectado podr\u00eda aprovechar esta vulnerabilidad emitiendo un comando de cliente SSH manipulado a la CLI. Un exploit exitoso podr\u00eda permitir al atacante elevar los privilegios a root en el dispositivo afectado."
    }
  ],
  "id": "CVE-2024-20320",
  "lastModified": "2025-08-05T14:40:07.707",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-03-13T17:15:48.193",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ssh-privesc-eWDMKew3"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-266"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…