CVE-2020-3167

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated local attackers to execute arbitrary commands on Cisco FXOS and UCS Manager systems through insufficient input validation in the CLI. Attackers can craft malicious arguments to specific commands, gaining OS-level access with the privileges of the currently logged-in user (or root on UCS 6400 Series). Only users with local CLI access are affected.

💻 Affected Systems

Products:
  • Cisco FXOS Software
  • Cisco UCS Manager Software
Versions: Multiple versions as specified in Cisco advisory
Operating Systems: Cisco FXOS, Cisco UCS Manager
Default Config Vulnerable: ⚠️ Yes
Notes: All affected platforms except Cisco UCS 6400 Series execute commands with logged-in user privileges; UCS 6400 Series execute with root privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root privileges on UCS 6400 Series Fabric Interconnects, allowing complete control over network infrastructure and potential lateral movement.

🟠

Likely Case

Privilege escalation from authenticated user to OS-level command execution, enabling data theft, configuration changes, or persistence mechanisms.

🟢

If Mitigated

Limited impact if proper access controls restrict local CLI access to trusted administrators only.

🌐 Internet-Facing: LOW - Requires local CLI access, not directly exploitable over network interfaces.
🏢 Internal Only: HIGH - Any authenticated local user can potentially exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated local access and knowledge of vulnerable CLI commands. No public exploit code available at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco Security Advisory for specific fixed versions

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-fxos-ucs-cmdinj

Restart Required: Yes

Instructions:

1. Review Cisco Security Advisory for affected versions. 2. Upgrade to fixed software releases. 3. Apply patches following Cisco's upgrade procedures. 4. Reboot affected systems as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit local CLI access to trusted administrators only using role-based access controls.

Monitor CLI Usage

all

Implement logging and monitoring of CLI commands for suspicious patterns.

🧯 If You Can't Patch

  • Implement strict access controls to limit local CLI access to essential personnel only
  • Enable comprehensive logging and monitoring of CLI sessions for detection of exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check software version against affected versions listed in Cisco Security Advisory

Check Version:

show version (Cisco CLI command)

Verify Fix Applied:

Verify software version has been updated to fixed release specified in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Commands with unexpected arguments
  • Privilege escalation attempts

Network Indicators:

  • None - local exploitation only

SIEM Query:

Search for CLI command logs containing suspicious argument patterns or privilege escalation indicators

🔗 References

📤 Share & Export