Cisco IOS XE Software for Cisco Catalyst and Rugged Series Switches Secure Boot Bypass Vulnerability
A vulnerability in the bootloader of Cisco IOS XE Software for Cisco Catalyst and Rugged Series Switches allows an authenticated attacker with level-15 privileges or an unauthenticated attacker with physical access to bypass Secure Boot and execute arbitrary code at boot time. The vulnerability stems from insufficient validation of software during the boot process. An attacker could manipulate loaded binaries to bypass integrity checks, allowing execution of non-Cisco-signed code and breaking the chain of trust. This affects Catalyst 9200 Series, Catalyst ESS9300 Embedded Series, Catalyst IE9310/IE9320 Rugged Series, and IE3500/IE3505 Rugged Series Switches running vulnerable firmware versions.
- Physical access to the device's console/storage, OR
- Valid administrator (level-15) credentials and network access to the device's management interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/deba10d8-297c-40a7-b1a7-45ff13ea02e5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.