CVE-2020-3396 | Date: (C)2020-09-25 (M)2023-12-22 |
A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 7.2 | CVSS Score : 6.9 |
Exploit Score: 0.5 | Exploit Score: 3.4 |
Impact Score: 6.0 | Impact Score: 10.0 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: PHYSICAL | Access Vector: LOCAL |
Attack Complexity: LOW | Access Complexity: MEDIUM |
Privileges Required: HIGH | Authentication: NONE |
User Interaction: NONE | Confidentiality: COMPLETE |
Scope: CHANGED | Integrity: COMPLETE |
Confidentiality: HIGH | Availability: COMPLETE |
Integrity: HIGH | |
Availability: HIGH | |
| |