漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities
漏洞信息
Multiple vulnerabilities in the initialization routines that are executed during bootup of Cisco IOS XE Software for Cisco ASR 900 Series Aggregation Services Routers with a Route Switch Processor 3 (RSP3) installed could allow an authenticated, local attacker with high privileges to execute persistent code at bootup and break the chain of trust. These vulnerabilities are due to incorrect validations by boot scripts when specific ROM monitor (ROMMON) variables are set. An attacker could exploit these vulnerabilities by copying a specific file to the local file system of an affected device and defining specific ROMMON variables. A successful exploit could allow the attacker to run arbitrary code on the underlying operating system (OS) with root privileges. To exploit these vulnerabilities, an attacker would need to have access to the root shell on the device or have physical access to the device.
漏洞信息
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
漏洞
暴露危险的方法或函数
漏洞
Cisco IOS XE Software 和 Cisco ASR 900 代码注入漏洞
漏洞信息
Cisco IOS等都是美国思科(Cisco)公司的产品。Cisco IOS是一套为其网络设备开发的操作系统。IOS XE是一套为其网络设备开发的操作系统。CLI是其中的一个命令行界面。Cisco ASR 900是一款900系列聚合服务路由器。Cisco IOS XE是一套为Cisco网络设备开发的操作系统。 Cisco IOS XE Software Cisco ASR 900 中存在安全漏洞,该漏洞源于设置了特定的ROM监视器(ROMMON)变量时启动脚本对验证的不正确所致,该漏洞允许攻击者通过将特定
漏洞信息
N/A
漏洞
N/A