Vulnerabilities > Cisco

DATE CVE VULNERABILITY TITLE RISK
2024-09-11 CVE-2024-20390 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751. This vulnerability is due to a lack of proper error validation of ingress XML packets.
network
low complexity
cisco
5.3
2024-09-11 CVE-2024-20398 OS Command Injection vulnerability in Cisco IOS XR
A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to obtain read/write file system access on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands.
local
low complexity
cisco CWE-78
7.8
2024-09-11 CVE-2024-20406 Unspecified vulnerability in Cisco IOS XR
A vulnerability in the segment routing feature for the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of ingress IS-IS packets.
low complexity
cisco
7.4
2024-09-11 CVE-2024-20483 OS Command Injection vulnerability in Cisco IOS XR
Multiple vulnerabilities in Cisco Routed PON Controller Software, which runs as a docker container on hardware that is supported by Cisco IOS XR Software, could allow an authenticated, remote attacker with Administrator-level privileges on the PON Manager or direct access to the PON Manager MongoDB instance to perform command injection attacks on the PON Controller container and execute arbitrary commands as root. These vulnerabilities are due to insufficient validation of arguments that are passed to specific configuration commands.
network
low complexity
cisco CWE-78
7.2
2024-09-11 CVE-2024-20489 Insufficiently Protected Credentials vulnerability in Cisco IOS XR
A vulnerability in the storage method of the PON Controller configuration file could allow an authenticated, local attacker with low privileges to obtain the MongoDB credentials. This vulnerability is due to improper storage of the unencrypted database credentials on the device that is running Cisco IOS XR Software.
local
low complexity
cisco CWE-522
5.5
2024-09-04 CVE-2024-20439 Use of Hard-coded Credentials vulnerability in Cisco Smart License Utility
A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to log in to an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account.
network
low complexity
cisco CWE-798
critical
9.8
2024-09-04 CVE-2024-20440 Information Exposure Through Log Files vulnerability in Cisco Smart License Utility 2.0.0/2.1.0/2.2.0
A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information. This vulnerability is due to excessive verbosity in a debug log file.
network
low complexity
cisco CWE-532
7.5
2024-09-04 CVE-2024-20469 OS Command Injection vulnerability in Cisco Identity Services Engine 3.2/3.3
A vulnerability in specific CLI commands in Cisco Identity Services Engine (ISE) could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root.
local
low complexity
cisco CWE-78
6.7
2024-09-04 CVE-2024-20503 Missing Encryption of Sensitive Data vulnerability in Cisco DUO Authentication for Epic
A vulnerability in Cisco Duo Epic for Hyperdrive could allow an authenticated, local attacker to view sensitive information in cleartext on an affected system. This vulnerability is due to improper storage of an unencrypted registry key.
local
low complexity
cisco CWE-311
5.5
2024-08-28 CVE-2024-20284 Unspecified vulnerability in Cisco Nx-Os 9.3(13)
A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device. The vulnerability is due to insufficient validation of user-supplied input.
local
low complexity
cisco
8.8