Unknown
CVE-2023-20076
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-20076
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- 807 industrial integrated services router firmware,
- 807 industrial integrated services router firmware 15.9(3)m,
- 807 industrial integrated services router firmware 15.9(3)m1,
- 807 industrial integrated services router firmware 15.9(3)m2,
- 807 industrial integrated services router firmware 15.9(3)m2a,
- 807 industrial integrated services router firmware 15.9(3)m3,
- 807 industrial integrated services router firmware 15.9(3)m4,
- 807 industrial integrated services router firmware 15.9(3)m4a,
- 807 industrial integrated services router firmware 15.9(3)m5,
- 807 industrial integrated services router firmware 15.9(3)m6a,
- 807 industrial integrated services router firmware 15.9(3)m6b,
- 809 industrial integrated services router firmware,
- 809 industrial integrated services router firmware 15.9(3)m,
- 809 industrial integrated services router firmware 15.9(3)m1,
- 809 industrial integrated services router firmware 15.9(3)m2,
- 809 industrial integrated services router firmware 15.9(3)m2a,
- 809 industrial integrated services router firmware 15.9(3)m3,
- 809 industrial integrated services router firmware 15.9(3)m4,
- 809 industrial integrated services router firmware 15.9(3)m4a,
- 809 industrial integrated services router firmware 15.9(3)m5,
- 809 industrial integrated services router firmware 15.9(3)m6a,
- 809 industrial integrated services router firmware 15.9(3)m6b,
- 829 industrial integrated services router firmware,
- 829 industrial integrated services router firmware 15.9(3)m,
- 829 industrial integrated services router firmware 15.9(3)m1,
- 829 industrial integrated services router firmware 15.9(3)m2,
- 829 industrial integrated services router firmware 15.9(3)m2a,
- 829 industrial integrated services router firmware 15.9(3)m3,
- 829 industrial integrated services router firmware 15.9(3)m4,
- 829 industrial integrated services router firmware 15.9(3)m4a,
- 829 industrial integrated services router firmware 15.9(3)m5,
- 829 industrial integrated services router firmware 15.9(3)m6a,
- 829 industrial integrated services router firmware 15.9(3)m6b,
- cgr1000 firmware,
- cgr1240 firmware,
- ic3000 industrial compute gateway,
- ios xe,
- ios xe 17.10.0,
- iox -,
- ir510 wpan firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: