Lucene search

K
nvd[email protected]NVD:CVE-2023-20035
HistoryMar 23, 2023 - 5:15 p.m.

CVE-2023-20035

2023-03-2317:15:14
CWE-146
web.nvd.nist.gov
10
cisco
ios xe
sd-wan
vulnerability
local attacker
arbitrary commands
elevated privileges
input validation
system cli
operating system
complete control

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.

Affected configurations

Nvd
Node
ciscoios_xe_sd-wanMatch-
AND
ciscocatalyst_8000v_edgeMatch-
OR
cisco1100-4g\/6g_integrated_services_routerMatch-
OR
cisco1100-4p_integrated_services_routerMatch-
OR
cisco1100-8p_integrated_services_routerMatch-
OR
cisco1100_integrated_services_routerMatch-
OR
cisco1101-4p_integrated_services_routerMatch-
OR
cisco1101_integrated_services_routerMatch-
OR
cisco1109-2p_integrated_services_routerMatch-
OR
cisco1109-4p_integrated_services_routerMatch-
OR
cisco1109_integrated_services_routerMatch-
OR
cisco1120_integrated_services_routerMatch-
OR
cisco1131_integrated_services_routerMatch-
OR
cisco1160_integrated_services_routerMatch-
OR
cisco4221_integrated_services_routerMatch-
OR
cisco4321_integrated_services_routerMatch-
OR
cisco4331_integrated_services_routerMatch-
OR
cisco4351_integrated_services_routerMatch-
OR
cisco4431_integrated_services_routerMatch-
OR
cisco4451-x_integrated_services_routerMatch-
OR
cisco4451_integrated_services_routerMatch-
OR
cisco4461_integrated_services_routerMatch-
OR
ciscoasr_1001-xMatch-
OR
ciscoasr_1002-hxMatch-
OR
ciscoasr_1006-xMatch-
OR
ciscoasr_1009-xMatch-
OR
ciscocatalyst_8200Match-
OR
ciscocatalyst_8300Match-
OR
ciscocatalyst_8300-1n1s-4t2xMatch-
OR
ciscocatalyst_8300-1n1s-6tMatch-
OR
ciscocatalyst_8300-2n2s-4t2xMatch-
OR
ciscocatalyst_8300-2n2s-6tMatch-
OR
ciscocatalyst_8500Match-
OR
ciscocatalyst_8500-4qcMatch-
OR
ciscocatalyst_8500lMatch-
OR
ciscocatalyst_8510csrMatch-
OR
ciscocatalyst_8510msrMatch-
OR
ciscocatalyst_8540csrMatch-
OR
ciscocatalyst_8540msrMatch-
OR
ciscocsr_1000vMatch-
VendorProductVersionCPE
ciscoios_xe_sd-wan-cpe:2.3:o:cisco:ios_xe_sd-wan:-:*:*:*:*:*:*:*
ciscocatalyst_8000v_edge-cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*
cisco1100-4g\/6g_integrated_services_router-cpe:2.3:h:cisco:1100-4g\/6g_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-4p_integrated_services_router-cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100-8p_integrated_services_router-cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*
cisco1100_integrated_services_router-cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cisco1101-4p_integrated_services_router-cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*
cisco1101_integrated_services_router-cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*
cisco1109-2p_integrated_services_router-cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*
cisco1109-4p_integrated_services_router-cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 401

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0

Percentile

5.1%

Related for NVD:CVE-2023-20035