CVE-2026-20046
Cisco · IOS XR
A privilege escalation vulnerability in Cisco IOS XR Software's task group assignment allows local authenticated attackers to gain full administrative control over the device.
Executive summary
Flawed task group assignment for specific CLI commands in Cisco IOS XR allows local authenticated users to elevate their privileges to full administrative control.
Vulnerability
The vulnerability is located within the task group assignment logic for a specific CLI command. An authenticated, local attacker can exploit this logic flaw to bypass intended permission restrictions and gain unauthorized administrative rights.
Business impact
The ability for a low-privileged user to elevate to full administrative control poses a severe threat to network security. An attacker could reconfigure the entire network backbone, disable security features, or cause prolonged service outages. The CVSS score of 8.8 underscores the critical nature of this privilege escalation, which effectively negates internal access controls.
Remediation
Immediate Action: Install the latest software maintenance updates from Cisco to correct the task group assignment logic and prevent unauthorized privilege elevation.
Proactive Monitoring: Audit user task group assignments and review command execution logs for any unauthorized use of administrative-level commands by non-admin accounts.
Compensating Controls: Use external TACACS+ or RADIUS servers to strictly enforce command-level authorization and provide a centralized audit trail of all user actions.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Elevating privileges to administrative levels allows an attacker to bypass almost all security boundaries on the device. It is imperative that administrators apply the relevant Cisco updates immediately. Until patching is complete, perform a comprehensive review of all local user permissions and task group memberships to ensure no accounts have been granted excessive rights.