Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cqj5-c26p-jcv4

Опубликовано: 04 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.

This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.

There are workarounds that address this vulnerability.

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.

This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.

There are workarounds that address this vulnerability.

EPSS

Процентиль: 1%
0.00012
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-269
CWE-732

Связанные уязвимости

CVSS3: 4.4
nvd
больше 2 лет назад

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.

CVSS3: 6.7
fstec
больше 2 лет назад

Уязвимость программного обеспечения серверов Cisco BroadWorks, связанная с недостатками контроля доступа, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 1%
0.00012
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-269
CWE-732