TROYANOSYVIRUS
Back to CVEs

CVE-2023-20076

HIGH
7.2

Description

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

CVE Details

CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published2/12/2023
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

cisco:807_industrial_integrated_services_routercisco:807_industrial_integrated_services_router_firmwarecisco:809_industrial_integrated_services_routercisco:809_industrial_integrated_services_router_firmwarecisco:829_industrial_integrated_services_routercisco:829_industrial_integrated_services_router_firmwarecisco:cgr1000cisco:cgr1000_firmwarecisco:cgr1240cisco:cgr1240_firmwarecisco:ic3000_industrial_compute_gatewaycisco:ios_xecisco:ioxcisco:ir510_wpancisco:ir510_wpan_firmware

Weaknesses (CWE)

CWE-233CWE-78

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.