Lucene search

K
cvelistCiscoCVELIST:CVE-2023-20209
HistoryAug 16, 2023 - 8:59 p.m.

CVE-2023-20209

2023-08-1620:59:41
cisco
www.cve.org
5
cisco
expressway
telepresence
remote code execution
command injection
authentication

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

44.9%

A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.

This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco TelePresence Video Communication Server (VCS) Expressway",
    "versions": [
      {
        "version": "X8.5.1",
        "status": "affected"
      },
      {
        "version": "X8.5.3",
        "status": "affected"
      },
      {
        "version": "X8.5",
        "status": "affected"
      },
      {
        "version": "X8.6.1",
        "status": "affected"
      },
      {
        "version": "X8.6",
        "status": "affected"
      },
      {
        "version": "X8.1.1",
        "status": "affected"
      },
      {
        "version": "X8.1.2",
        "status": "affected"
      },
      {
        "version": "X8.1",
        "status": "affected"
      },
      {
        "version": "X8.2.1",
        "status": "affected"
      },
      {
        "version": "X8.2.2",
        "status": "affected"
      },
      {
        "version": "X8.2",
        "status": "affected"
      },
      {
        "version": "X8.7.1",
        "status": "affected"
      },
      {
        "version": "X8.7.2",
        "status": "affected"
      },
      {
        "version": "X8.7.3",
        "status": "affected"
      },
      {
        "version": "X8.7",
        "status": "affected"
      },
      {
        "version": "X8.8.1",
        "status": "affected"
      },
      {
        "version": "X8.8.2",
        "status": "affected"
      },
      {
        "version": "X8.8.3",
        "status": "affected"
      },
      {
        "version": "X8.8",
        "status": "affected"
      },
      {
        "version": "X8.9.1",
        "status": "affected"
      },
      {
        "version": "X8.9.2",
        "status": "affected"
      },
      {
        "version": "X8.9",
        "status": "affected"
      },
      {
        "version": "X8.10.0",
        "status": "affected"
      },
      {
        "version": "X8.10.1",
        "status": "affected"
      },
      {
        "version": "X8.10.2",
        "status": "affected"
      },
      {
        "version": "X8.10.3",
        "status": "affected"
      },
      {
        "version": "X8.10.4",
        "status": "affected"
      },
      {
        "version": "X12.5.8",
        "status": "affected"
      },
      {
        "version": "X12.5.9",
        "status": "affected"
      },
      {
        "version": "X12.5.0",
        "status": "affected"
      },
      {
        "version": "X12.5.2",
        "status": "affected"
      },
      {
        "version": "X12.5.7",
        "status": "affected"
      },
      {
        "version": "X12.5.3",
        "status": "affected"
      },
      {
        "version": "X12.5.4",
        "status": "affected"
      },
      {
        "version": "X12.5.5",
        "status": "affected"
      },
      {
        "version": "X12.5.1",
        "status": "affected"
      },
      {
        "version": "X12.5.6",
        "status": "affected"
      },
      {
        "version": "X12.6.0",
        "status": "affected"
      },
      {
        "version": "X12.6.1",
        "status": "affected"
      },
      {
        "version": "X12.6.2",
        "status": "affected"
      },
      {
        "version": "X12.6.3",
        "status": "affected"
      },
      {
        "version": "X12.6.4",
        "status": "affected"
      },
      {
        "version": "X12.7.0",
        "status": "affected"
      },
      {
        "version": "X12.7.1",
        "status": "affected"
      },
      {
        "version": "X8.11.1",
        "status": "affected"
      },
      {
        "version": "X8.11.2",
        "status": "affected"
      },
      {
        "version": "X8.11.4",
        "status": "affected"
      },
      {
        "version": "X8.11.3",
        "status": "affected"
      },
      {
        "version": "X8.11.0",
        "status": "affected"
      },
      {
        "version": "X14.0.1",
        "status": "affected"
      },
      {
        "version": "X14.0.3",
        "status": "affected"
      },
      {
        "version": "X14.0.2",
        "status": "affected"
      },
      {
        "version": "X14.0.4",
        "status": "affected"
      },
      {
        "version": "X14.0.5",
        "status": "affected"
      },
      {
        "version": "X14.0.6",
        "status": "affected"
      },
      {
        "version": "X14.0.7",
        "status": "affected"
      },
      {
        "version": "X14.0.8",
        "status": "affected"
      },
      {
        "version": "X14.0.9",
        "status": "affected"
      },
      {
        "version": "X14.0.10",
        "status": "affected"
      },
      {
        "version": "X14.0.11",
        "status": "affected"
      },
      {
        "version": "X14.2.1",
        "status": "affected"
      },
      {
        "version": "X14.2.2",
        "status": "affected"
      },
      {
        "version": "X14.2.5",
        "status": "affected"
      },
      {
        "version": "X14.2.6",
        "status": "affected"
      },
      {
        "version": "X14.2.0",
        "status": "affected"
      },
      {
        "version": "X14.2.7",
        "status": "affected"
      },
      {
        "version": "X14.3.0",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

44.9%

Related for CVELIST:CVE-2023-20209