A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute unauthorized commands within the CLI. An attacker with Administrator privileges could also execute arbitrary commands on the underlying operating system of Cisco UCS 6400 and 6500 Series Fabric Interconnects with root-level privileges.

Project Subscriptions

Vendors Products
Firepower 4100 Subscribe
Firepower 4110 Subscribe
Firepower 4112 Subscribe
Firepower 4115 Subscribe
Firepower 4120 Subscribe
Firepower 4125 Subscribe
Firepower 4140 Subscribe
Firepower 4145 Subscribe
Firepower 4150 Subscribe
Firepower 9300 Sm-24 Subscribe
Firepower 9300 Sm-36 Subscribe
Firepower 9300 Sm-40 Subscribe
Firepower 9300 Sm-44 Subscribe
Firepower 9300 Sm-44 X 3 Subscribe
Firepower 9300 Sm-48 Subscribe
Firepower 9300 Sm-56 Subscribe
Firepower 9300 Sm-56 X 3 Subscribe
Firepower Extensible Operating System Subscribe
Ucs 6200 Subscribe
Ucs 6200 Firmware Subscribe
Ucs 6248up Subscribe
Ucs 6248up Firmware Subscribe
Ucs 6296up Subscribe
Ucs 6296up Firmware Subscribe
Ucs 6300 Subscribe
Ucs 6300 Firmware Subscribe
Ucs 6324 Subscribe
Ucs 6324 Firmware Subscribe
Ucs 6332 Subscribe
Ucs 6332-16up Subscribe
Ucs 6332-16up Firmware Subscribe
Ucs 6332 Firmware Subscribe
Ucs 64108 Subscribe
Ucs 64108 Firmware Subscribe
Ucs 6454 Subscribe
Ucs 6454 Firmware Subscribe
Ucs 6536 Subscribe
Ucs 6536 Firmware Subscribe
Ucs Central Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24194 A vulnerability in the CLI of Cisco Firepower 4100 Series, Cisco Firepower 9300 Security Appliances, and Cisco UCS 6200, 6300, 6400, and 6500 Series Fabric Interconnects could allow an authenticated, local attacker to inject unauthorized commands. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to execute unauthorized commands within the CLI. An attacker with Administrator privileges could also execute arbitrary commands on the underlying operating system of Cisco UCS 6400 and 6500 Series Fabric Interconnects with root-level privileges.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 28 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-28T16:33:53.572Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20015

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.589Z

cve-icon NVD

Status : Modified

Published: 2023-02-23T20:15:13.333

Modified: 2024-11-21T07:40:20.853

Link: CVE-2023-20015

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses