Lucene search

K
cve[email protected]CVE-2023-20217
HistoryAug 16, 2023 - 10:15 p.m.

CVE-2023-20217

2023-08-1622:15:11
CWE-250
web.nvd.nist.gov
28
cve-2023-20217
cisco
thousandeyes
enterprise agent
virtual appliance
vulnerability
privilege escalation
input validation
nvd
security
exploit

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

Affected configurations

NVD
Node
ciscothousandeyes_enterprise_agentRange<0.230
OR
ciscothousandeyes_recorderMatch-

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco ThousandEyes Recorder Application",
    "versions": [
      {
        "version": "N/A",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%