Логотип exploitDog
bind:CVE-2023-20235
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20235

Количество 3

Количество 3

nvd логотип

CVE-2023-20235

больше 2 лет назад

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-j6h7-r25f-wgww

больше 2 лет назад

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-06748

больше 2 лет назад

Уязвимость программной платформы Cisco IOx операционной системы Cisco IOS XE, позволяющая нарушителю получить доступ к базовой операционной системе в качестве пользователя root

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20235

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
github логотип
GHSA-j6h7-r25f-wgww

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06748

Уязвимость программной платформы Cisco IOx операционной системы Cisco IOS XE, позволяющая нарушителю получить доступ к базовой операционной системе в качестве пользователя root

CVSS3: 6.5
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу