Show plain JSON{"id": "CVE-2023-20175", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.0}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.0}]}, "published": "2023-11-01T18:15:09.330", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-78"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in a specific Cisco ISE CLI command could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, an attacker must have valid Read-only-level privileges or higher on the affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root."}, {"lang": "es", "value": "Una vulnerabilidad en un comando espec\u00edfico de Cisco ISE CLI podr\u00eda permitir que un atacante local autenticado realice ataques de inyecci\u00f3n de comandos en el sistema operativo subyacente y eleve los privilegios a root. Para aprovechar esta vulnerabilidad, un atacante debe tener privilegios v\u00e1lidos de nivel de solo lectura o superior en el dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un comando CLI manipulado. Un exploit exitoso podr\u00eda permitir al atacante elevar los privilegios a root."}], "lastModified": "2024-11-21T07:40:44.887", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F6D1780-3306-4481-A3CD-8F7732D955CC"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00756651-F667-4E4A-8024-3EAF003A9B92"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57E9CE5A-219F-4702-9E8A-074ED35BD252"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07BF9702-0607-49A1-A82A-E4ADF1A4135F"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11AA4EC0-6F3C-45A9-9AA4-0D81876F44B5"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A80C77E-EEA3-440F-B3EA-08468756D3E2"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B4B88F0-3229-4B07-9308-C37C794595A0"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E02F0E61-FBFF-4C6D-9132-E266FF67802B"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541EC483-540A-4080-AA69-82A0F30EE3D6"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66CAFE97-295F-48F7-A92C-A90D3B837483"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.6.0:patch9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68E172B4-867E-4413-9D45-F04B52270D41"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F22FABF-2831-4895-B0A9-283B98398F43"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B83D0F20-5A43-4583-AFAF-CD9D20352437"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2887A2C0-BADA-41D3-AA6A-F10BC58AA7F9"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5ADE32BD-C500-47D8-86D6-B08F55F1BBDF"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22F23314-96BE-42F6-AE07-CC13F8856029"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76265489-E5DC-46F1-9475-2FDFCEE32CF4"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9517A1B4-45BA-44DD-9122-C86BF9075EFE"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BC35A24-68DB-43C5-A817-9B35018F5990"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC94625A-6ED0-439B-A2DA-15A49B2FED93"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:2.7.0:patch9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2392609B-AFEA-4BBD-99FA-E90AD4C2AE8F"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1063044-BCD7-487F-9880-141C30547E36"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA42E65A-7207-48B8-BE1B-0B352201BC09"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75DDAF38-4D5F-4EE4-A428-68D28FC0DA96"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5FB6AA6-F8C9-48A6-BDDA-1D25C43564EB"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B3A267A-5FEA-426D-903E-BD3F4F94A1A4"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1B3207B-1B9C-41AA-8EF6-8478458462E7"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5B9E7F3-B0F2-4A6A-B939-A62E9B12CCEB"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF4C5A58-D0AE-48D6-9757-18C1D5BE5070"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4DB9726-532F-45CE-81FD-45F2F6C7CE51"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E8F0066-0EC0-41FD-80BE-55C4ED5F6B0E"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D1765DB-1BEF-4CE9-8B86-B91F709600EB"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D1E80EF-C3FD-4F7A-B63D-0EAA5C878B11"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.1:patch5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "095F27EC-5713-4D4F-AD06-57D3DF068B90"}, {"criteria": "cpe:2.3:a:cisco:identity_services_engine:3.2:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36722B6C-64A5-4D00-94E1-442878C37A35"}], "operator": "OR"}]}], "sourceIdentifier": "ykramarz@cisco.com"}