8.8
CVE-2023-20235
- EPSS 0.18%
- Published 04.10.2023 17:15:09
- Last modified 21.11.2024 07:40:57
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Ios Xe Version < 17.3.1
Cisco ≫ Catalyst Ie3200 Rugged Switch Version-
Cisco ≫ Catalyst Ie3300 Rugged Switch Version-
Cisco ≫ Catalyst Ie3400 Rugged Switch Version-
Cisco ≫ Catalyst Ir1101 Version-
Cisco ≫ Catalyst Ir1821-k9 Version-
Cisco ≫ Catalyst Ir1831-k9 Version-
Cisco ≫ Catalyst Ir1833-k9 Version-
Cisco ≫ Catalyst Ir1835-k9 Version-
Cisco ≫ Catalyst Ir8140h-k9 Version-
Cisco ≫ Catalyst Ir8140h-p-k9 Version-
Cisco ≫ Catalyst Ir8340-k9 Version-
Cisco ≫ Ess-3300-24t-con-a Version-
Cisco ≫ Ess-3300-24t-con-e Version-
Cisco ≫ Ess-3300-24t-ncp-a Version-
Cisco ≫ Ess-3300-24t-ncp-e Version-
Cisco ≫ Ess-3300-con-a Version-
Cisco ≫ Ess-3300-con-e Version-
Cisco ≫ Ess-3300-ncp-a Version-
Cisco ≫ Ess-3300-ncp-e Version-
Cisco ≫ Catalyst Ie3300 Rugged Switch Version-
Cisco ≫ Catalyst Ie3400 Rugged Switch Version-
Cisco ≫ Catalyst Ir1101 Version-
Cisco ≫ Catalyst Ir1821-k9 Version-
Cisco ≫ Catalyst Ir1831-k9 Version-
Cisco ≫ Catalyst Ir1833-k9 Version-
Cisco ≫ Catalyst Ir1835-k9 Version-
Cisco ≫ Catalyst Ir8140h-k9 Version-
Cisco ≫ Catalyst Ir8140h-p-k9 Version-
Cisco ≫ Catalyst Ir8340-k9 Version-
Cisco ≫ Ess-3300-24t-con-a Version-
Cisco ≫ Ess-3300-24t-con-e Version-
Cisco ≫ Ess-3300-24t-ncp-a Version-
Cisco ≫ Ess-3300-24t-ncp-e Version-
Cisco ≫ Ess-3300-con-a Version-
Cisco ≫ Ess-3300-con-e Version-
Cisco ≫ Ess-3300-ncp-a Version-
Cisco ≫ Ess-3300-ncp-e Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.398 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
psirt@cisco.com | 6.5 | 1.2 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
CWE-552 Files or Directories Accessible to External Parties
The product makes files or directories accessible to unauthorized actors, even though they should not be.