漏洞信息详情
Cisco IOS XR 参数注入漏洞
漏洞简介
Cisco IOS XR是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。
Cisco IOS XR软件存在参数注入漏洞,该漏洞源于Cisco IOS XR Software的SSH Server进程对于用户为特定文件传输方法提供的参数的输入验证不足。这可能允许经过身份验证的远程攻击者可利用该漏洞覆盖并读取本地设备上的任意文件。具有低级权限的攻击者可利用该漏洞可以通过在对设备进行身份验证时指定安全复制协议(SCP)参数来利用该漏洞。成功的攻击可以让攻击者可利用该漏洞提升他们的权限,并在他们应该在的设备上检索和上传文件。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-inject-QwZOCv2
参考网址
来源:CISCO
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-inject-QwZOCv2
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3022.5
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021090912
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Cisco-IOS-XR-read-write-access-via-SSH-Server-36357
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-scp-inject-QwZOCv2
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3022.2
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-34718
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3022.4
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3022.3
受影响实体
暂无
补丁
- Cisco IOS XR 参数注入漏洞的修复措施<!--2021-9-8-->
还没有评论,来说两句吧...