Show plain JSON{"id": "CVE-2023-20234", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.4, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 0.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.0, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "NONE"}, "impactScore": 5.2, "exploitabilityScore": 0.8}]}, "published": "2023-08-23T19:15:08.277", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-arbitrary-file-BLk6YupL", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-arbitrary-file-BLk6YupL", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-73"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-732"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to create a file or overwrite any file on the filesystem of an affected device, including system files.\r\n\r The vulnerability occurs because there is no validation of parameters when a specific CLI command is used. An attacker could exploit this vulnerability by authenticating to an affected device and using the command at the CLI. A successful exploit could allow the attacker to overwrite any file on the disk of the affected device, including system files. The attacker must have valid administrative credentials on the affected device to exploit this vulnerability."}], "lastModified": "2024-11-21T07:40:57.383", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:firepower_extensible_operating_system:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA31612B-EF1E-4676-8423-285C2125C0CB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6F79864-CA70-4192-AC2C-E174DF3F25B2"}, {"criteria": "cpe:2.3:h:cisco:firepower_1010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7FFE3880-4B85-4E23-9836-70875D5109F7"}, {"criteria": "cpe:2.3:h:cisco:firepower_1020:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EA8B5AF8-6A57-482A-9442-E857EE7E207B"}, {"criteria": "cpe:2.3:h:cisco:firepower_1030:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A9929280-2AAC-4B56-A42C-1F6EDE83988E"}, {"criteria": "cpe:2.3:h:cisco:firepower_1040:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F29B6BC3-D716-4A3D-9679-B7BE81F719C8"}, {"criteria": "cpe:2.3:h:cisco:firepower_2100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D23A26EF-5B43-437C-A962-4FC69D8A0FF4"}, {"criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72"}, {"criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F"}, {"criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B"}, {"criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140"}, {"criteria": "cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9E9552E6-0B9B-4B32-BE79-90D4E3887A7B"}, {"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F"}, {"criteria": "cpe:2.3:h:cisco:firepower_4110_next-generation_firewall:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CC4B991-7160-4C32-9A8E-778602FDE349"}, {"criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1"}, {"criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE"}, {"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46"}, {"criteria": "cpe:2.3:h:cisco:firepower_4120_next-generation_firewall:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9DB5299D-3948-474C-B977-8FD2A849945D"}, {"criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F"}, {"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4"}, {"criteria": "cpe:2.3:h:cisco:firepower_4140_next-generation_firewall:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "161EEC9B-419D-4C88-B546-04931D0037E7"}, {"criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24"}, {"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B"}, {"criteria": "cpe:2.3:h:cisco:firepower_4150_next-generation_firewall:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CDEAEC97-05AC-4E8B-A9A5-14800AAF1EB8"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0574E77C-18C6-4621-B73A-DCDD6D1B5E37"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "18048A84-BA0F-48EF-AFFB-635FF7F70C66"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "317DF3DD-C7CD-4CA2-804F-A738E048BEB4"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C13CF29B-9308-452B-B7E0-9E818B5A6C1E"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6DB527C2-855E-4BB9-BCA7-94BE86100D44"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E82C1B05-990D-49D2-B80A-C3EDD4082840"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "421D91C3-8AB3-45E1-9E55-13ED1A4A623E"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D741945-8B0A-408D-A5FE-D5B38DC6D46A"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9308CA67-E949-4338-A890-22B3C4428D70"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-24_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F3C6CC11-470A-47A4-AAF5-D5580FB78562"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-36_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AA4A2B35-5106-4F43-835A-7F97D2324373"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-44_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F0F7F452-9294-4445-A344-1A76B277C45D"}, {"criteria": "cpe:2.3:h:cisco:firepower_9300_with_3_sm-44_module:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3EA604D8-76C0-40B9-8675-02BEEA18E432"}, {"criteria": "cpe:2.3:h:cisco:secure_firewall_3105:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A5D9FDF8-13BF-425F-9802-1A334065D7C0"}, {"criteria": "cpe:2.3:h:cisco:secure_firewall_3110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "87403E0F-659C-4C5B-863D-0274D2828A9A"}, {"criteria": "cpe:2.3:h:cisco:secure_firewall_3120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "73D24C57-2311-48E9-879E-124472E98F6F"}, {"criteria": "cpe:2.3:h:cisco:secure_firewall_3130:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BE02D38A-5354-47E6-A46F-06D53F14F5A8"}, {"criteria": "cpe:2.3:h:cisco:secure_firewall_3140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F191A423-DB18-4F3A-9D31-C3DD8F185C88"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}