We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-20676

Cisco IOS XE Software Tool Command Language Privilege Escalation Vulnerability



Assignercisco
Reserved2021-11-02
Published2022-04-15
Updated2024-09-16

Description

A vulnerability in the Tool Command Language (Tcl) interpreter of Cisco IOS XE Software could allow an authenticated, local attacker to escalate from privilege level 15 to root-level privileges. This vulnerability is due to insufficient input validation of data that is passed into the Tcl interpreter. An attacker could exploit this vulnerability by loading malicious Tcl code on an affected device. A successful exploit could allow the attacker to execute arbitrary commands as root. By default, Tcl shell access requires privilege level 15.



MEDIUM: 5.1CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N

Product status

Any version
affected

References

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-grbtubU (20220413 Cisco IOS XE Software Tool Command Language Privilege Escalation Vulnerability) vendor-advisory

cve.org CVE-2022-20676

nvd.nist.gov CVE-2022-20676

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-20676
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.