ID

VAR-202304-0135


CVE

CVE-2023-20152


TITLE

Cisco Identity Services Engine  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2023-001940

DESCRIPTION

Multiple vulnerabilities in specific Cisco Identity Services Engine (ISE) CLI commands could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit these vulnerabilities, an attacker must have valid Administrator privileges on the affected device. These vulnerabilities are due to insufficient validation of user-supplied input. An attacker could exploit these vulnerabilities by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root. (DoS) It may be in a state. Cisco Identity Services Engine is an environment awareness platform from the American company Cisco. There is a security vulnerability in Cisco Identity Services Engine. A local attacker can use this vulnerability to submit special requests, gain root privileges, and execute arbitrary code

Trust: 2.25

sources: NVD: CVE-2023-20152 // JVNDB: JVNDB-2023-001940 // CNVD: CNVD-2023-93336 // VULMON: CVE-2023-20152

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-93336

AFFECTED PRODUCTS

vendor:ciscomodel:identity services enginescope:eqversion:3.2

Trust: 1.0

vendor:シスコシステムズmodel:cisco identity services enginescope: - version: -

Trust: 0.8

vendor:シスコシステムズmodel:cisco identity services enginescope:eqversion: -

Trust: 0.8

vendor:ciscomodel:identity services enginescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-93336 // JVNDB: JVNDB-2023-001940 // NVD: CVE-2023-20152

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-20152
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2023-20152
value: MEDIUM

Trust: 1.0

NVD: CVE-2023-20152
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2023-93336
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202304-320
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2023-93336
severity: MEDIUM
baseScore: 5.9
vectorString: AV:L/AC:L/AU:M/C:C/I:C/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 2.5
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-20152
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2023-20152
baseSeverity: MEDIUM
baseScore: 6.0
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2023-20152
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-93336 // JVNDB: JVNDB-2023-001940 // CNNVD: CNNVD-202304-320 // NVD: CVE-2023-20152 // NVD: CVE-2023-20152

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-001940 // NVD: CVE-2023-20152

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202304-320

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202304-320

PATCH

title:cisco-sa-ise-injection-2XbOg9Dgurl:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-2XbOg9Dg

Trust: 0.8

title:Patch for Cisco Identity Services Engine command injection vulnerability (CNVD-2023-93336)url:https://www.cnvd.org.cn/patchInfo/show/492356

Trust: 0.6

title:Cisco Identity Services Engine Fixes for operating system command injection vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=233020

Trust: 0.6

title:Cisco: Cisco Identity Services Engine Command Injection Vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-ise-injection-2XbOg9Dg

Trust: 0.1

sources: CNVD: CNVD-2023-93336 // VULMON: CVE-2023-20152 // JVNDB: JVNDB-2023-001940 // CNNVD: CNNVD-202304-320

EXTERNAL IDS

db:NVDid:CVE-2023-20152

Trust: 3.9

db:JVNDBid:JVNDB-2023-001940

Trust: 0.8

db:CNVDid:CNVD-2023-93336

Trust: 0.6

db:AUSCERTid:ESB-2023.2014

Trust: 0.6

db:CNNVDid:CNNVD-202304-320

Trust: 0.6

db:VULMONid:CVE-2023-20152

Trust: 0.1

sources: CNVD: CNVD-2023-93336 // VULMON: CVE-2023-20152 // JVNDB: JVNDB-2023-001940 // CNNVD: CNNVD-202304-320 // NVD: CVE-2023-20152

REFERENCES

url:https://sec.cloudapps.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-ise-injection-2xbog9dg

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-20152

Trust: 1.4

url:https://cxsecurity.com/cveshow/cve-2023-20152/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.2014

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-93336 // VULMON: CVE-2023-20152 // JVNDB: JVNDB-2023-001940 // CNNVD: CNNVD-202304-320 // NVD: CVE-2023-20152

SOURCES

db:CNVDid:CNVD-2023-93336
db:VULMONid:CVE-2023-20152
db:JVNDBid:JVNDB-2023-001940
db:CNNVDid:CNNVD-202304-320
db:NVDid:CVE-2023-20152

LAST UPDATE DATE

2024-08-14T14:36:56.076000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-93336date:2023-11-28T00:00:00
db:VULMONid:CVE-2023-20152date:2023-04-05T00:00:00
db:JVNDBid:JVNDB-2023-001940date:2023-05-24T05:03:00
db:CNNVDid:CNNVD-202304-320date:2023-04-12T00:00:00
db:NVDid:CVE-2023-20152date:2023-11-07T04:06:15.710

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-93336date:2023-11-28T00:00:00
db:VULMONid:CVE-2023-20152date:2023-04-05T00:00:00
db:JVNDBid:JVNDB-2023-001940date:2023-05-24T00:00:00
db:CNNVDid:CNNVD-202304-320date:2023-04-05T00:00:00
db:NVDid:CVE-2023-20152date:2023-04-05T18:15:08.003