A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute unauthorized commands within the CLI. An attacker with Administrator privileges could also execute arbitrary commands on the underlying operating system of Cisco UCS 6400 and 6500 Series Fabric Interconnects with root-level privileges.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Firepower 4100
Subscribe
Firepower 4110
Subscribe
Firepower 4112
Subscribe
Firepower 4115
Subscribe
Firepower 4120
Subscribe
Firepower 4125
Subscribe
Firepower 4140
Subscribe
Firepower 4145
Subscribe
Firepower 4150
Subscribe
Firepower 9300 Sm-24
Subscribe
Firepower 9300 Sm-36
Subscribe
Firepower 9300 Sm-40
Subscribe
Firepower 9300 Sm-44
Subscribe
Firepower 9300 Sm-44 X 3
Subscribe
Firepower 9300 Sm-48
Subscribe
Firepower 9300 Sm-56
Subscribe
Firepower 9300 Sm-56 X 3
Subscribe
Firepower Extensible Operating System
Subscribe
Ucs 6200
Subscribe
Ucs 6200 Firmware
Subscribe
Ucs 6248up
Subscribe
Ucs 6248up Firmware
Subscribe
Ucs 6296up
Subscribe
Ucs 6296up Firmware
Subscribe
Ucs 6300
Subscribe
Ucs 6300 Firmware
Subscribe
Ucs 6324
Subscribe
Ucs 6324 Firmware
Subscribe
Ucs 6332
Subscribe
Ucs 6332-16up
Subscribe
Ucs 6332-16up Firmware
Subscribe
Ucs 6332 Firmware
Subscribe
Ucs 64108
Subscribe
Ucs 64108 Firmware
Subscribe
Ucs 6454
Subscribe
Ucs 6454 Firmware
Subscribe
Ucs 6536
Subscribe
Ucs 6536 Firmware
Subscribe
Ucs Central Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24194 | A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute unauthorized commands within the CLI. An attacker with Administrator privileges could also execute arbitrary commands on the underlying operating system of Cisco UCS 6400 and 6500 Series Fabric Interconnects with root-level privileges. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 28 Oct 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-28T16:33:53.572Z
Reserved: 2022-10-27T00:00:00
Link: CVE-2023-20015
Updated: 2024-08-02T08:57:35.589Z
Status : Modified
Published: 2023-02-23T20:15:13.333
Modified: 2024-11-21T07:40:20.853
Link: CVE-2023-20015
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD