Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-03094

Опубликовано: 19 апр. 2023
Источник: fstec
CVSS3: 4.4
CVSS2: 4.3
EPSS Низкий

Описание

Уязвимость интерфейса командной строки (CLI) микропрограммного обеспечения устройства управления конференц-связью CiscoTelePresence Collaboration Endpoint (CE) и операционных систем Cisco RoomOS связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю перезаписать произвольные файлы

Вендор

Cisco Systems Inc.

Наименование ПО

RoomOS
TelePresence Collaboration Endpoint (CE)

Версия ПО

10.0 (RoomOS)
11.0 (RoomOS)
10.0 (TelePresence Collaboration Endpoint (CE))
11.0 (TelePresence Collaboration Endpoint (CE))

Тип ПО

Операционная система
ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 4,4)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 24%
0.00082
Низкий

4.4 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 4.4
nvd
около 1 года назад

Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

CVSS3: 4.4
github
около 1 года назад

Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. These vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account. Note: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

EPSS

Процентиль: 24%
0.00082
Низкий

4.4 Medium

CVSS3

4.3 Medium

CVSS2