CVE-2023-20102
Published Apr 5, 2023
Last updated a year ago
Overview
- Description
- A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:secure_network_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F159605-C93D-4A6E-B9A1-B8AE6E9B268A", "versionEndIncluding": "7.4.1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:stealthwatch_management_console_2200_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FC4568E-20F3-43D4-8658-6A742C47F5E9" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:stealthwatch_management_console_2200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CB9D17FE-41BC-43EB-B729-25AB3BD126DF" } ], "operator": "OR" } ], "operator": "AND" } ]