CVE-2020-3210 (CNNVD-202006-309)
中文标题:
Cisco 809 Industrial ISRs、829 Industrial ISRs和Cisco 1000 Series Connected Grid Routers IOS Software 操作系统命令注入漏洞
英文标题:
Cisco IOS Software for Cisco Industrial Routers Virtual Device Server CLI Command Injection Vulnerability
漏洞描述
中文描述:
Cisco IOS和Cisco 1000 Series Connected Grid Routers(CGR1000)都是美国思科(Cisco)公司的产品。Cisco 1000 Series Connected Grid Routers是一款1000系列互联网格路由器。Cisco IOS Software是运行在其中的一套为其网络设备开发的软件。Cisco 1000 Series Connected Grid Routers是一款1000系列互联网格路由器。Cisco IOS是一套为其网络设备开发的操作系统。 Cisco 809 Industrial ISRs、829 Industrial ISRs和Cisco 1000 Series Connected Grid Routers (CGR1000) 中的IOS Software存在操作系统命令注入漏洞,该漏洞源于程序没有充分验证发送VDS相关CLI命令的参数。本地攻击者可利用该漏洞在VDS的Linux shell上下文中以root权限执行任意命令。
英文描述:
A vulnerability in the CLI parsers of Cisco IOS Software for Cisco 809 and 829 Industrial Integrated Services Routers (Industrial ISRs) and Cisco 1000 Series Connected Grid Routers (CGR1000) could allow an authenticated, local attacker to execute arbitrary shell commands on the Virtual Device Server (VDS) of an affected device. The attacker must have valid user credentials at privilege level 15. The vulnerability is due to insufficient validation of arguments that are passed to specific VDS-related CLI commands. An attacker could exploit this vulnerability by authenticating to the targeted device and including malicious input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands in the context of the Linux shell of VDS with the privileges of the root user.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco IOS 12.2(60)EZ16 | n/a | - | - |
cpe:2.3:a:cisco:cisco_ios_12.2(60)ez16:n_a:*:*:*:*:*:*:*
|
| cisco | ios | 12.2\(60\)ez16 | - | - |
cpe:2.3:o:cisco:ios:12.2\(60\)ez16:*:*:*:*:*:*:*
|
| cisco | ios | 15.0\(2\)sg11a | - | - |
cpe:2.3:o:cisco:ios:15.0\(2\)sg11a:*:*:*:*:*:*:*
|
| cisco | ios | 15.3\(3\)jaa1 | - | - |
cpe:2.3:o:cisco:ios:15.3\(3\)jaa1:*:*:*:*:*:*:*
|
| cisco | ios | 15.3\(3\)jpj | - | - |
cpe:2.3:o:cisco:ios:15.3\(3\)jpj:*:*:*:*:*:*:*
|
| cisco | ios | 15.9\(3\)m | - | - |
cpe:2.3:o:cisco:ios:15.9\(3\)m:*:*:*:*:*:*:*
|
| cisco | ios | 15.9\(3\)m0a | - | - |
cpe:2.3:o:cisco:ios:15.9\(3\)m0a:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
MEDIUMCVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3210 |
2025-11-11 15:20:36 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3210 |
2025-11-11 14:56:59 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202006-309 |
2025-11-11 15:10:26 | 2025-11-11 07:56:15 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-202006-309
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 7
- data_sources: ['cve'] -> ['cve', 'nvd']