6.7

CVE-2023-20097

A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CiscoWireless Lan Controller Software Version < 8.10.183.0
   CiscoEsw6300 Version-
CiscoAironet Access Point Software Version < 17.9.0.135
   CiscoAironet 1540 Version-
   CiscoAironet 1542d Version-
   CiscoAironet 1542i Version-
   CiscoAironet 1560 Version-
   CiscoAironet 1562d Version-
   CiscoAironet 1562e Version-
   CiscoAironet 1562i Version-
   CiscoAironet 1800 Version-
   CiscoAironet 1800i Version-
   CiscoAironet 1810 Version-
   CiscoAironet 1810w Version-
   CiscoAironet 1815 Version-
   CiscoAironet 1815i Version-
   CiscoAironet 1815m Version-
   CiscoAironet 1815t Version-
   CiscoAironet 1815w Version-
   CiscoAironet 2800 Version-
   CiscoAironet 2800e Version-
   CiscoAironet 2800i Version-
   CiscoAironet 3800 Version-
   CiscoAironet 3800e Version-
   CiscoAironet 3800i Version-
   CiscoAironet 3800p Version-
   CiscoAironet 4800 Version-
   CiscoCatalyst 9100 Version-
   CiscoCatalyst 9105 Version-
   CiscoCatalyst 9105ax Version-
   CiscoCatalyst 9105axi Version-
   CiscoCatalyst 9105axw Version-
   CiscoCatalyst 9115 Version-
   CiscoCatalyst 9115 Ap Version-
   CiscoCatalyst 9115ax Version-
   CiscoCatalyst 9115axe Version-
   CiscoCatalyst 9115axi Version-
   CiscoCatalyst 9117 Version-
   CiscoCatalyst 9117 Ap Version-
   CiscoCatalyst 9117ax Version-
   CiscoCatalyst 9117axi Version-
   CiscoCatalyst 9120 Version-
   CiscoCatalyst 9120 Ap Version-
   CiscoCatalyst 9120ax Version-
   CiscoCatalyst 9120axe Version-
   CiscoCatalyst 9120axi Version-
   CiscoCatalyst 9120axp Version-
   CiscoCatalyst 9124 Version-
   CiscoCatalyst 9124ax Version-
   CiscoCatalyst 9124axd Version-
   CiscoCatalyst 9124axi Version-
   CiscoCatalyst 9130 Version-
   CiscoCatalyst 9130 Ap Version-
   CiscoCatalyst 9130ax Version-
   CiscoCatalyst 9130axe Version-
   CiscoCatalyst 9130axi Version-
   CiscoCatalyst Iw6300 Version-
   CiscoCatalyst Iw6300 Ac Version-
   CiscoCatalyst Iw6300 Dc Version-
   CiscoCatalyst Iw6300 Dcw Version-
CiscoIos Xe Version < 16.12.8
CiscoIos Xe Version >= 17.1 < 17.3.6
CiscoIos Xe Version >= 17.4 < 17.6.5
CiscoIos Xe Version >= 17.7 < 17.9.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.191
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 4.6 1.5 2.7
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.