← Zuruck zu CVEs
CVE-2023-20076
HIGH7.2
Beschreibung
A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.
CVE Details
CVSS v3.1 Bewertung7.2
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht2/12/2023
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
cisco:807_industrial_integrated_services_routercisco:807_industrial_integrated_services_router_firmwarecisco:809_industrial_integrated_services_routercisco:809_industrial_integrated_services_router_firmwarecisco:829_industrial_integrated_services_routercisco:829_industrial_integrated_services_router_firmwarecisco:cgr1000cisco:cgr1000_firmwarecisco:cgr1240cisco:cgr1240_firmwarecisco:ic3000_industrial_compute_gatewaycisco:ios_xecisco:ioxcisco:ir510_wpancisco:ir510_wpan_firmware
Schwachen (CWE)
CWE-233CWE-78
Referenzen
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL(psirt@cisco.com)
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.