Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-20235

Опубликовано: 04 окт. 2023
Источник: nvd
CVSS3: 6.5
CVSS3: 8.8
EPSS Низкий

Описание

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.

This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
Версия до 17.3.1 (исключая)

Одно из

cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir1101:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir1821-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir1831-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir1833-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir1835-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir8140h-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir8140h-p-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_ir8340-k9:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-24t-con-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-24t-con-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-24t-ncp-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-24t-ncp-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-con-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-con-e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-ncp-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ess-3300-ncp-e:-:*:*:*:*:*:*:*

EPSS

Процентиль: 39%
0.00177
Низкий

6.5 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-552
CWE-269

Связанные уязвимости

CVSS3: 6.5
github
больше 2 лет назад

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость программной платформы Cisco IOx операционной системы Cisco IOS XE, позволяющая нарушителю получить доступ к базовой операционной системе в качестве пользователя root

EPSS

Процентиль: 39%
0.00177
Низкий

6.5 Medium

CVSS3

8.8 High

CVSS3

Дефекты

CWE-552
CWE-269