8.8

CVE-2023-20235

A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.

 This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Xe Version < 17.3.1
   CiscoCatalyst Ie3200 Rugged Switch Version-
   CiscoCatalyst Ie3300 Rugged Switch Version-
   CiscoCatalyst Ie3400 Rugged Switch Version-
   CiscoCatalyst Ir1101 Version-
   CiscoCatalyst Ir1821-k9 Version-
   CiscoCatalyst Ir1831-k9 Version-
   CiscoCatalyst Ir1833-k9 Version-
   CiscoCatalyst Ir1835-k9 Version-
   CiscoCatalyst Ir8140h-k9 Version-
   CiscoCatalyst Ir8140h-p-k9 Version-
   CiscoCatalyst Ir8340-k9 Version-
   CiscoEss-3300-24t-con-a Version-
   CiscoEss-3300-24t-con-e Version-
   CiscoEss-3300-24t-ncp-a Version-
   CiscoEss-3300-24t-ncp-e Version-
   CiscoEss-3300-con-a Version-
   CiscoEss-3300-con-e Version-
   CiscoEss-3300-ncp-a Version-
   CiscoEss-3300-ncp-e Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.18% 0.398
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
psirt@cisco.com 6.5 1.2 5.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

CWE-552 Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.