7.1
CVE-2023-20008
- EPSS 0.03%
- Veröffentlicht 20.01.2023 07:15:13
- Zuletzt bearbeitet 21.11.2024 07:40:19
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the CLI of Cisco TelePresence CE and RoomOS Software could allow an authenticated, local attacker to overwrite arbitrary files on the local system of an affected device. This vulnerability is due to improper access controls on files that are in the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Telepresence Collaboration Endpoint Version8.0.0
Cisco ≫ Telepresence Collaboration Endpoint Version8.0.1
Cisco ≫ Telepresence Collaboration Endpoint Version8.1.0
Cisco ≫ Telepresence Collaboration Endpoint Version8.1.1
Cisco ≫ Telepresence Collaboration Endpoint Version8.2.0
Cisco ≫ Telepresence Collaboration Endpoint Version8.2.1
Cisco ≫ Telepresence Collaboration Endpoint Version8.2.2
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.0
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.1
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.2
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.3
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.5
Cisco ≫ Telepresence Collaboration Endpoint Version8.3.6
Cisco ≫ Telepresence Collaboration Endpoint Version9.0.1
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.1
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.2
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.4
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.5
Cisco ≫ Telepresence Collaboration Endpoint Version9.1.6
Cisco ≫ Telepresence Collaboration Endpoint Version9.2.1
Cisco ≫ Telepresence Collaboration Endpoint Version9.2.2
Cisco ≫ Telepresence Collaboration Endpoint Version9.2.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.2.4
Cisco ≫ Telepresence Collaboration Endpoint Version9.9.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.9.4
Cisco ≫ Telepresence Collaboration Endpoint Version9.10.1
Cisco ≫ Telepresence Collaboration Endpoint Version9.10.2
Cisco ≫ Telepresence Collaboration Endpoint Version9.10.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.12.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.12.4
Cisco ≫ Telepresence Collaboration Endpoint Version9.12.5
Cisco ≫ Telepresence Collaboration Endpoint Version9.13.0
Cisco ≫ Telepresence Collaboration Endpoint Version9.13.1
Cisco ≫ Telepresence Collaboration Endpoint Version9.13.2
Cisco ≫ Telepresence Collaboration Endpoint Version9.13.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.14.3
Cisco ≫ Telepresence Collaboration Endpoint Version9.14.4
Cisco ≫ Telepresence Collaboration Endpoint Version9.14.5
Cisco ≫ Telepresence Collaboration Endpoint Version9.14.6
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.0.10
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.0.11
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.3.25
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.3.26
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.8.12
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.10.8
Cisco ≫ Telepresence Collaboration Endpoint Version9.15.13.0
Cisco ≫ Telepresence Tc Version7.3.5
Cisco ≫ Telepresence Tc Version7.3.6
Cisco ≫ Telepresence Tc Version7.3.7
Cisco ≫ Telepresence Tc Version7.3.9
Cisco ≫ Telepresence Tc Version7.3.13
Cisco ≫ Telepresence Tc Version7.3.21
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.062 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.1 | 1.8 | 5.2 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
| psirt@cisco.com | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.