CVE-2023-20260

A vulnerability in the application CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager could allow an authenticated, local attacker to gain escalated privileges. This vulnerability is due to improper processing of command line arguments to application scripts. An attacker could exploit this vulnerability by issuing a command on the CLI with malicious options. A successful exploit could allow the attacker to gain the escalated privileges of the root user on the underlying operating system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.10.4:-:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update_1:*:*:*:*:*:*

History

02 Feb 2024, 16:15

Type Values Removed Values Added
CWE CWE-284

24 Jan 2024, 18:41

Type Values Removed Values Added
First Time Cisco evolved Programmable Network Manager
Cisco
Cisco prime Infrastructure
Summary
  • (es) Una vulnerabilidad en la CLI de la aplicación de Cisco Prime Infrastructure y Cisco Evolved Programmable Network Manager podría permitir que un atacante local autenticado obtenga privilegios aumentados. Esta vulnerabilidad se debe al procesamiento inadecuado de los argumentos de la línea de comando en los scripts de la aplicación. Un atacante podría aprovechar esta vulnerabilidad emitiendo un comando en la CLI con opciones maliciosas. Una explotación exitosa podría permitir al atacante obtener privilegios aumentados del usuario root en el sistema operativo subyacente.
CPE cpe:2.3:a:cisco:prime_infrastructure:3.10.4:-:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:evolved_programmable_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update_1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 6.0
v2 : unknown
v3 : 6.7
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq - () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-wkZJeyeq - Vendor Advisory
CWE CWE-88

17 Jan 2024, 17:35

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-17 17:15

Updated : 2024-02-02 16:15


NVD link : CVE-2023-20260

Mitre link : CVE-2023-20260

CVE.ORG link : CVE-2023-20260


JSON object : View

Products Affected

cisco

  • evolved_programmable_network_manager
  • prime_infrastructure
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

CWE-284

Improper Access Control