Vulnerability Description
A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to insufficient application of restrictions during the execution of a specific command. An attacker could exploit this vulnerability by using a specific command at the command line. A successful exploit could allow the attacker to obtain read-only access to files that are located on the flash: filesystem that otherwise might not have been accessible.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | 16.3.11 |
| Cisco | 2610Xm | - |
| Cisco | 2611Xm | - |
| Cisco | 2612 | - |
| Cisco | 2620Xm | - |
| Cisco | 2621Xm | - |
| Cisco | 2650Xm | - |
| Cisco | 2651Xm | - |
| Cisco | 2691 | - |
Related Weaknesses (CWE)
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iVendor Advisory
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iVendor Advisory
FAQ
What is CVE-2020-3477?
CVE-2020-3477 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A vulnerability in the CLI parser of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, local attacker to access files from the flash: filesystem. The vulnerability is due to i...
How severe is CVE-2020-3477?
CVE-2020-3477 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-3477?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios, Cisco 2610Xm, Cisco 2611Xm, Cisco 2612, Cisco 2620Xm.