Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-20216

Опубликовано: 03 авг. 2023
Источник: nvd
CVSS3: 4.4
CVSS3: 7.8
EPSS Низкий

Описание

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.

This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.

There are workarounds that address this vulnerability.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:cisco:broadworks_application_delivery_platform:*:*:*:*:*:*:*:*
Версия до ri.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Версия до 23.0.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
Версия от 24.0 (включая) до 24.0.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_database_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_execution_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_media_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_network_database_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_network_function_manager:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:-:*:*:*
Версия до 23.0.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:-:*:*:*
Версия до 23.0.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_service_control_function_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_troubleshooting_server:*:*:*:*:release_independent:*:*:*
Версия до 2023.06 (исключая)
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:-:*:*:*
Версия до 23.0.2023.05 (исключая)
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:release_independent:*:*:*
Версия до 2023.05 (исключая)

EPSS

Процентиль: 1%
0.00012
Низкий

4.4 Medium

CVSS3

7.8 High

CVSS3

Дефекты

CWE-269
CWE-732

Связанные уязвимости

CVSS3: 4.4
github
больше 2 лет назад

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.

CVSS3: 6.7
fstec
больше 2 лет назад

Уязвимость программного обеспечения серверов Cisco BroadWorks, связанная с недостатками контроля доступа, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 1%
0.00012
Низкий

4.4 Medium

CVSS3

7.8 High

CVSS3

Дефекты

CWE-269
CWE-732