7.8

CVE-2023-20035

A vulnerability in the CLI of Cisco IOS XE SD-WAN Software could allow an authenticated, local attacker to execute arbitrary commands with elevated privileges. This vulnerability is due to insufficient input validation by the system CLI. An attacker with privileges to run commands could exploit this vulnerability by first authenticating to an affected device using either local terminal access or a management shell interface and then submitting crafted input to the system CLI. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. Note: For additional information about specific impacts, see the Details section of this advisory.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Xe Sd-wan Version-
   CiscoCatalyst 8000v Edge Version-
   Cisco1100-4g/6g Integrated Services Router Version-
   Cisco1100-4p Integrated Services Router Version-
   Cisco1100-8p Integrated Services Router Version-
   Cisco1100 Integrated Services Router Version-
   Cisco1101-4p Integrated Services Router Version-
   Cisco1101 Integrated Services Router Version-
   Cisco1109-2p Integrated Services Router Version-
   Cisco1109-4p Integrated Services Router Version-
   Cisco1109 Integrated Services Router Version-
   Cisco1120 Integrated Services Router Version-
   Cisco1131 Integrated Services Router Version-
   Cisco1160 Integrated Services Router Version-
   Cisco4221 Integrated Services Router Version-
   Cisco4321 Integrated Services Router Version-
   Cisco4331 Integrated Services Router Version-
   Cisco4351 Integrated Services Router Version-
   Cisco4431 Integrated Services Router Version-
   Cisco4451-x Integrated Services Router Version-
   Cisco4451 Integrated Services Router Version-
   Cisco4461 Integrated Services Router Version-
   CiscoAsr 1001-x Version-
   CiscoAsr 1002-hx Version-
   CiscoAsr 1006-x Version-
   CiscoAsr 1009-x Version-
   CiscoCatalyst 8200 Version-
   CiscoCatalyst 8300 Version-
   CiscoCatalyst 8300-1n1s-4t2x Version-
   CiscoCatalyst 8300-1n1s-6t Version-
   CiscoCatalyst 8300-2n2s-4t2x Version-
   CiscoCatalyst 8300-2n2s-6t Version-
   CiscoCatalyst 8500 Version-
   CiscoCatalyst 8500-4qc Version-
   CiscoCatalyst 8500l Version-
   CiscoCatalyst 8510csr Version-
   CiscoCatalyst 8510msr Version-
   CiscoCatalyst 8540csr Version-
   CiscoCatalyst 8540msr Version-
   CiscoCsr 1000v Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.099
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-146 Improper Neutralization of Expression/Command Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as expression or command delimiters when they are sent to a downstream component.