Lucene search

K
ciscoCiscoCISCO-SA-SUDO-PRIVESC-JAN2021-QNYQFCM
HistoryJan 29, 2021 - 9:30 p.m.

Sudo Privilege Escalation Vulnerability Affecting Cisco Products: January 2021

2021-01-2921:30:00
tools.cisco.com
140

0.97 High

EPSS

Percentile

99.7%

A vulnerability in the command line parameter parsing code of Sudo could allow an authenticated, local attacker to execute commands or binaries with root privileges.

The vulnerability is due to improper parsing of command line parameters that may result in a heap-based buffer overflow. An attacker could exploit this vulnerability by accessing a Unix shell on an affected device and then invoking the sudoedit command with crafted parameters or by executing a binary exploit. A successful exploit could allow the attacker to execute commands or binaries with root privileges.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM”]