Lucene search

K
nvd[email protected]NVD:CVE-2023-20217
HistoryAug 16, 2023 - 10:15 p.m.

CVE-2023-20217

2023-08-1622:15:11
CWE-250
web.nvd.nist.gov
4
cisco thousandeyes
privilege escalation
input validation
authenticated
local attacker
cve-2023-20217

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0

Percentile

5.1%

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

Affected configurations

Nvd
Node
ciscothousandeyes_enterprise_agentRange<0.230
OR
ciscothousandeyes_recorderMatch-
VendorProductVersionCPE
ciscothousandeyes_enterprise_agent*cpe:2.3:a:cisco:thousandeyes_enterprise_agent:*:*:*:*:*:*:*:*
ciscothousandeyes_recorder-cpe:2.3:a:cisco:thousandeyes_recorder:-:*:*:*:*:*:*:*

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0

Percentile

5.1%