Lucene search

K
cvelistIllumioCVELIST:CVE-2023-5183
HistorySep 26, 2023 - 9:29 p.m.

CVE-2023-5183 Authenticated RCE due to unsafe JSON deserialization

2023-09-2621:29:36
CWE-502
Illumio
www.cve.org
illumio pce
cve-2023-5183
authenticated
rce
unsafe json deserialization
code execution
api authentication
network_traffic endpoint
operating system user

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.3%

Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "PCE"
    ],
    "platforms": [
      "Linux"
    ],
    "product": "Core PCE",
    "vendor": "Illumio",
    "versions": [
      {
        "lessThanOrEqual": "19.3.6",
        "status": "affected",
        "version": "19.3.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.2.7",
        "status": "affected",
        "version": "21.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.5.35",
        "status": "affected",
        "version": "21.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.2.41",
        "status": "affected",
        "version": "22.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.5.30",
        "status": "affected",
        "version": "22.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "23.2.10",
        "status": "affected",
        "version": "23.2.0",
        "versionType": "release train"
      }
    ]
  }
]

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.3%

Related for CVELIST:CVE-2023-5183