Description
A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
Published: 2023-03-23
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-24208 A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root.
History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Catalyst 9200 Catalyst 9200cx Catalyst 9200l Catalyst 9300 Catalyst 9300-24p-a Catalyst 9300-24p-e Catalyst 9300-24s-a Catalyst 9300-24s-e Catalyst 9300-24t-a Catalyst 9300-24t-e Catalyst 9300-24u-a Catalyst 9300-24u-e Catalyst 9300-24ux-a Catalyst 9300-24ux-e Catalyst 9300-48p-a Catalyst 9300-48p-e Catalyst 9300-48s-a Catalyst 9300-48s-e Catalyst 9300-48t-a Catalyst 9300-48t-e Catalyst 9300-48u-a Catalyst 9300-48u-e Catalyst 9300-48un-a Catalyst 9300-48un-e Catalyst 9300-48uxm-a Catalyst 9300-48uxm-e Catalyst 9300l Catalyst 9300l-24p-4g-a Catalyst 9300l-24p-4g-e Catalyst 9300l-24p-4x-a Catalyst 9300l-24p-4x-e Catalyst 9300l-24t-4g-a Catalyst 9300l-24t-4g-e Catalyst 9300l-24t-4x-a Catalyst 9300l-24t-4x-e Catalyst 9300l-48p-4g-a Catalyst 9300l-48p-4g-e Catalyst 9300l-48p-4x-a Catalyst 9300l-48p-4x-e Catalyst 9300l-48t-4g-a Catalyst 9300l-48t-4g-e Catalyst 9300l-48t-4x-a Catalyst 9300l-48t-4x-e Catalyst 9300l Stack Catalyst 9300lm Catalyst 9300x Ios Xe
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-25T16:03:04.973Z

Reserved: 2022-10-27T00:00:00.000Z

Link: CVE-2023-20029

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.877Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T17:15:13.940

Modified: 2024-11-21T07:40:23.523

Link: CVE-2023-20029

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses