CVE-2023-20088

A vulnerability in the nginx configurations that are provided as part of the VPN-less reverse proxy for Cisco Finesse could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for new and existing users who are connected through a load balancer. This vulnerability is due to improper IP address filtering by the reverse proxy. An attacker could exploit this vulnerability by sending a series of unauthenticated requests to the reverse proxy. A successful exploit could allow the attacker to cause all current traffic and subsequent requests to the reverse proxy through a load balancer to be dropped, resulting in a DoS condition.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es02:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es03:*:*:*:*:*:*

History

10 Mar 2023, 14:04

Type Values Removed Values Added
References (CISCO) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-proxy-dos-vY5dQhrV - (CISCO) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-finesse-proxy-dos-vY5dQhrV - Vendor Advisory
CPE cpe:2.3:a:cisco:finesse:12.6\(1\):-:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es03:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es01:*:*:*:*:*:*
cpe:2.3:a:cisco:finesse:12.6\(1\):es02:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE NVD-CWE-noinfo
First Time Cisco
Cisco finesse

03 Mar 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-03-03 16:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-20088

Mitre link : CVE-2023-20088

CVE.ORG link : CVE-2023-20088


JSON object : View

Products Affected

cisco

  • finesse
CWE
NVD-CWE-noinfo CWE-285

Improper Authorization