A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.
This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.
There are workarounds that address this vulnerability.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Aug 2023, 15:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cisco:broadworks_media_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_database_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:* cpe:2.3:a:cisco:broadworks_application_delivery_platform:*:*:*:*:*:*:*:* cpe:2.3:a:cisco:broadworks_execution_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_network_function_manager:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_network_database_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_service_control_function_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_troubleshooting_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:-:*:*:* cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:-:*:*:* cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:release_independent:*:*:* cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:-:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | (MISC) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ - Vendor Advisory | |
CWE | CWE-732 |
03 Aug 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-03 22:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-20216
Mitre link : CVE-2023-20216
CVE.ORG link : CVE-2023-20216
JSON object : View
Products Affected
cisco
- broadworks_application_server
- broadworks_media_server
- broadworks_network_server
- broadworks_troubleshooting_server
- broadworks_profile_server
- broadworks_service_control_function_server
- broadworks_network_database_server
- broadworks_application_delivery_platform
- broadworks_network_function_manager
- broadworks_xtended_services_platform
- broadworks_database_server
- broadworks_execution_server