CVE-2024-20366

7.8 HIGH

📋 TL;DR

This vulnerability in Cisco Crosswork NSO's Tail-f HCC function pack allows authenticated local attackers to escalate privileges to root by manipulating executable file search paths. Attackers need valid credentials on affected devices. The vulnerability affects Cisco Crosswork Network Services Orchestrator installations with the Tail-f HCC function pack.

💻 Affected Systems

Products:
  • Cisco Crosswork Network Services Orchestrator
Versions: All versions prior to 7.1.1
Operating Systems: Linux-based systems running Cisco NSO
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the Tail-f High Availability Cluster Communications (HCC) function pack enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level arbitrary code execution, allowing attackers to install persistent backdoors, exfiltrate sensitive data, or disrupt network operations.

🟠

Likely Case

Privilege escalation from a lower-privileged user to root, enabling lateral movement within the network and potential compromise of other systems.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and network segmentation are implemented to restrict local user access.

🌐 Internet-Facing: LOW - Requires local authentication, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Authenticated local attackers can gain root access, posing significant risk to internal network security.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid local credentials and ability to configure the application to execute malicious files via path manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 7.1.1 or later

Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D

Restart Required: Yes

Instructions:

1. Download Cisco Crosswork NSO version 7.1.1 or later from Cisco Software Center. 2. Backup current configuration and data. 3. Install the updated version following Cisco's upgrade documentation. 4. Restart the NSO service to apply changes.

🔧 Temporary Workarounds

Restrict Local User Access

linux

Limit local user accounts to only essential personnel and implement strict access controls.

Implement Least Privilege

linux

Ensure users only have necessary permissions and cannot modify application configurations.

🧯 If You Can't Patch

  • Implement strict access controls to limit local user accounts and monitor for suspicious activity.
  • Isolate affected systems using network segmentation to contain potential breaches.

🔍 How to Verify

Check if Vulnerable:

Check NSO version with 'ncs --version' and verify if Tail-f HCC function pack is installed and version is below 7.1.1.

Check Version:

ncs --version

Verify Fix Applied:

Confirm NSO version is 7.1.1 or higher using 'ncs --version' and verify the patch is applied via Cisco's advisory verification steps.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Suspicious file execution from non-standard paths
  • Configuration changes to HCC function pack

Network Indicators:

  • Unexpected outbound connections from NSO servers
  • Anomalous authentication patterns

SIEM Query:

source="NSO" AND (event_type="privilege_escalation" OR event_type="config_change" AND component="HCC")

🔗 References

📤 Share & Export