POE network switch

Just a quick update. The switch is connected and working great. There were a few bonehead mistakes on my part, but the switch does just what I want. Thanks to @OVERKILL and @rijndael for your help!
No problem! Did you update the software? As I mentioned earlier in the thread, you can download the image with the WebUI if you want, there are a few more lines you need to add to the config to make it accessible, but it's pretty simple.
 
I have not been able to download the software. I created an account at cisco.com but when I log in and click the link in your post and try to download I see this:

Screenshot_20250805_105951.webp


If I click "this link" I get a blank page. I can't find a place to edit my profile.
 
Most potential "privilege escalations" i.e. being able to take control without the password were related to the web interface, which you should disable anyway.
 
Most potential "privilege escalations" i.e. being able to take control without the password were related to the web interface, which you should disable anyway.
This is typically true, however the vast majority of resolved caveats seem to be DoS related, and of that category, it's SNMP that stands out. It is nice to see two bug fixes on that list as well, given the age of the product.

Of the caveats listed as "privilege escalation":

CSCwj97907 - IESDM (HTTP -> Ability to gain level 15 with a lower level account)
CSCwm64309 - CLI - Level 15 user can gain root on the underlying OS (this has an impact score of HIGH)
CSCwm66565 - CLI - Level 15 user can gain root on the underlying OS (this has an impact score of HIGH)
CSCwm68661 - CLI - Level 15 user can gain root on the underlying OS (this has an impact score of HIGH)

The last three all seem to be variations of the same issue, but they all have separate CVE's?

So, in this particular instance, of the privilege escalation caveats, 1/4 of them are web-based, the remaining 3/4 are CLI-based, which I find interesting, but not surprising given where we are in the product support lifecycle.

Given these facts, I think it's worthwhile to upgrade to this release.
 
https://sec.cloudapps.cisco.com/sec...urityAdvisory/cisco-sa-iosxe-privesc-su7scvdp



So, you have to be already at enable to execute the attack. While not insigficant, at this point, they already own you.
Yes, as I noted, you have to be a logged in Level 15 user. It's an interesting vuln for sure, I don't think for its exploitability in the wild, but rather the ability to traverse the containment from config to the host OS, which is why it's flagged as it is.
 
Back
Top Bottom