Логотип exploitDog
bind:CVE-2023-20136
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20136

Количество 3

Количество 3

nvd логотип

CVE-2023-20136

больше 2 лет назад

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-j98g-g34p-r4ch

больше 2 лет назад

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2023-03208

больше 3 лет назад

Уязвимость интерфейса OpenAPI средства защиты рабочих нагрузок мультиоблачных центров обработки данных Cisco Secure Workload (ранее Tetration), позволяющая нарушителю повысить свои привилегии

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20136

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
github логотип
GHSA-j98g-g34p-r4ch

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

CVSS3: 4.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03208

Уязвимость интерфейса OpenAPI средства защиты рабочих нагрузок мультиоблачных центров обработки данных Cisco Secure Workload (ранее Tetration), позволяющая нарушителю повысить свои привилегии

CVSS3: 4.3
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу