Vulnerable Products:
At the time of publication, this vulnerability affected Cisco IOS XE Software, regardless of device configuration.
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory.Products Confirmed Not Vulnerable:
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
IOS Software IOS XR Software NX-OS SoftwareWorkarounds:
There is a workaround that addresses this vulnerability. Set the privilege level of the start maintenance command manually by connecting to the device management CLI and using the privilege exec level 15 start maintenance configuration command, as shown in the following example:
Router# configuration terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# privilege exec level 15 start maintenance
While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.Fixed Software:
Cisco considers any workarounds and mitigations (if applicable) to be temporary solutions until an upgrade to a fixed software release is available. To fully remediate this vulnerability and avoid future exposure as described in this advisory, Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory. Cisco IOS...
16.10.116.10.1a16.10.1b16.10.1c16.10.1d16.10.1e16.10.1f16.10.1g16.10.1s16.10.2+247 moreExploitability
AV:LAC:LPR:LUI:NScope
S:CImpact
C:NI:NA:H6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H