Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2023-20220
HistoryNov 01, 2023 - 5:09 p.m.

CVE-2023-20220

2023-11-0117:09:42
cisco
github.com
6
cisco
fmc software
remote code execution

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

33.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "firepower_management_center",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.3"
      },
      {
        "status": "affected",
        "version": "6.2.3.1"
      },
      {
        "status": "affected",
        "version": "6.2.3.2"
      },
      {
        "status": "affected",
        "version": "6.2.3.4"
      },
      {
        "status": "affected",
        "version": "6.2.3.5"
      },
      {
        "status": "affected",
        "version": "6.2.3.6"
      },
      {
        "status": "affected",
        "version": "6.2.3.7"
      },
      {
        "status": "affected",
        "version": "6.2.3.9"
      },
      {
        "status": "affected",
        "version": "6.2.3.10"
      },
      {
        "status": "affected",
        "version": "6.2.3.11"
      },
      {
        "status": "affected",
        "version": "6.2..12"
      },
      {
        "status": "affected",
        "version": "6.2.3.13"
      },
      {
        "status": "affected",
        "version": "6.2.3.14"
      },
      {
        "status": "affected",
        "version": "6.2.3.15"
      },
      {
        "status": "affected",
        "version": "6.2.3.8"
      },
      {
        "status": "affected",
        "version": "6.2.3.16"
      },
      {
        "status": "affected",
        "version": "6.4.0"
      },
      {
        "status": "affected",
        "version": "6.4.0.1"
      },
      {
        "status": "affected",
        "version": "6.4.0.2"
      },
      {
        "status": "affected",
        "version": "6.4.0.3"
      },
      {
        "status": "affected",
        "version": "6.4.0.4"
      },
      {
        "status": "affected",
        "version": "6.4.0.5"
      },
      {
        "status": "affected",
        "version": "6.4.0.6"
      },
      {
        "status": "affected",
        "version": "6.4.0.7"
      },
      {
        "status": "affected",
        "version": "6.4.0.8"
      },
      {
        "status": "affected",
        "version": "6.4.0.9"
      },
      {
        "status": "affected",
        "version": "6.4.0.10"
      },
      {
        "status": "affected",
        "version": "6.4.0.11"
      },
      {
        "status": "affected",
        "version": "6.4.0.12"
      },
      {
        "status": "affected",
        "version": "6.4.0.13"
      },
      {
        "status": "affected",
        "version": "6.4.0.14"
      },
      {
        "status": "affected",
        "version": "6.4.0.15"
      },
      {
        "status": "affected",
        "version": "6.4.0.16"
      },
      {
        "status": "affected",
        "version": "6.6.0"
      },
      {
        "status": "affected",
        "version": "6.6.0.1"
      },
      {
        "status": "affected",
        "version": "6.6.1"
      },
      {
        "status": "affected",
        "version": "6.6.3"
      },
      {
        "status": "affected",
        "version": "6.6.4"
      },
      {
        "status": "affected",
        "version": "6.6.5"
      },
      {
        "status": "affected",
        "version": "6.6.5.1"
      },
      {
        "status": "affected",
        "version": "6.6.5.2"
      },
      {
        "status": "affected",
        "version": "6.6.7"
      },
      {
        "status": "affected",
        "version": "6.6.7.1"
      },
      {
        "status": "affected",
        "version": "6.7.0"
      },
      {
        "status": "affected",
        "version": "6.7.0.1"
      },
      {
        "status": "affected",
        "version": "6.7.0.2"
      },
      {
        "status": "affected",
        "version": "6.7.0.3"
      },
      {
        "status": "affected",
        "version": "7.0.0"
      },
      {
        "status": "affected",
        "version": "7.0.0.1"
      },
      {
        "status": "affected",
        "version": "7.0.1"
      },
      {
        "status": "affected",
        "version": "7.0.1.1"
      },
      {
        "status": "affected",
        "version": "7.0.2"
      },
      {
        "status": "affected",
        "version": "7.0.2.1"
      },
      {
        "status": "affected",
        "version": "7.0.3"
      },
      {
        "status": "affected",
        "version": "7.0.4"
      },
      {
        "status": "affected",
        "version": "7.0.5"
      },
      {
        "status": "affected",
        "version": "7.1.0"
      },
      {
        "status": "affected",
        "version": "7.1.0.1"
      },
      {
        "status": "affected",
        "version": "7.1.0.2"
      },
      {
        "status": "affected",
        "version": "7.1.0.3"
      },
      {
        "status": "affected",
        "version": "7.2.0"
      },
      {
        "status": "affected",
        "version": "7.2.1"
      },
      {
        "status": "affected",
        "version": "7.2.2"
      },
      {
        "status": "affected",
        "version": "7.2.0.1"
      },
      {
        "status": "affected",
        "version": "7.2.3"
      },
      {
        "status": "affected",
        "version": "7.2.3.1"
      },
      {
        "status": "affected",
        "version": "7.2.4"
      },
      {
        "status": "affected",
        "version": "7.3.0"
      },
      {
        "status": "affected",
        "version": "7.3.1"
      },
      {
        "status": "affected",
        "version": "7.3.1.1"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

33.7%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-20220