Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
Low
Attack Vector
Network
0

CVE-2023-20076

Disclosure Date: February 01, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
8.8 High
Impact Score:
5.9
Exploitability Score:
2.8
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • cisco

Products

  • 807 industrial integrated services router firmware,
  • 807 industrial integrated services router firmware 15.9(3)m,
  • 807 industrial integrated services router firmware 15.9(3)m1,
  • 807 industrial integrated services router firmware 15.9(3)m2,
  • 807 industrial integrated services router firmware 15.9(3)m2a,
  • 807 industrial integrated services router firmware 15.9(3)m3,
  • 807 industrial integrated services router firmware 15.9(3)m4,
  • 807 industrial integrated services router firmware 15.9(3)m4a,
  • 807 industrial integrated services router firmware 15.9(3)m5,
  • 807 industrial integrated services router firmware 15.9(3)m6a,
  • 807 industrial integrated services router firmware 15.9(3)m6b,
  • 809 industrial integrated services router firmware,
  • 809 industrial integrated services router firmware 15.9(3)m,
  • 809 industrial integrated services router firmware 15.9(3)m1,
  • 809 industrial integrated services router firmware 15.9(3)m2,
  • 809 industrial integrated services router firmware 15.9(3)m2a,
  • 809 industrial integrated services router firmware 15.9(3)m3,
  • 809 industrial integrated services router firmware 15.9(3)m4,
  • 809 industrial integrated services router firmware 15.9(3)m4a,
  • 809 industrial integrated services router firmware 15.9(3)m5,
  • 809 industrial integrated services router firmware 15.9(3)m6a,
  • 809 industrial integrated services router firmware 15.9(3)m6b,
  • 829 industrial integrated services router firmware,
  • 829 industrial integrated services router firmware 15.9(3)m,
  • 829 industrial integrated services router firmware 15.9(3)m1,
  • 829 industrial integrated services router firmware 15.9(3)m2,
  • 829 industrial integrated services router firmware 15.9(3)m2a,
  • 829 industrial integrated services router firmware 15.9(3)m3,
  • 829 industrial integrated services router firmware 15.9(3)m4,
  • 829 industrial integrated services router firmware 15.9(3)m4a,
  • 829 industrial integrated services router firmware 15.9(3)m5,
  • 829 industrial integrated services router firmware 15.9(3)m6a,
  • 829 industrial integrated services router firmware 15.9(3)m6b,
  • cgr1000 firmware,
  • cgr1240 firmware,
  • ic3000 industrial compute gateway,
  • ios xe,
  • ios xe 17.10.0,
  • iox -,
  • ir510 wpan firmware

Additional Info

Technical Analysis