5.3
CVE-2023-20012
- EPSS 0.01%
- Published 23.02.2023 20:15:13
- Last modified 21.11.2024 07:40:20
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nexus 93180yc-fx3s Firmware Version-
Cisco ≫ Nexus 93180yc-fx3 Firmware Version-
Cisco ≫ Ucs Central Software Version >= 4.2 < 4.2\(2d\)
Cisco ≫ Ucs 6536 Firmware Version-
Cisco ≫ Ucs Central Software Version >= 4.2 < 4.2\(2d\)
Cisco ≫ Ucs 64108 Firmware Version-
Cisco ≫ Ucs Central Software Version >= 4.2 < 4.2\(2d\)
Cisco ≫ Ucs 6454 Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.01% | 0.008 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.6 | 0.9 | 3.6 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
psirt@cisco.com | 5.3 | 0.9 | 4 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.