A vulnerability in the web UI of Cisco IND could allow an authenticated, remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system of an affected device.
This vulnerability is due to improper input validation when uploading a Device Pack. An attacker could exploit this vulnerability by altering the request that is sent when uploading a Device Pack. A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco industrial Network Director |
|
CPEs | cpe:2.3:a:cisco:industrial_network_director:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco industrial Network Director |
|
Metrics |
ssvc
|
Fri, 15 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the web UI of Cisco IND could allow an authenticated, remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. This vulnerability is due to improper input validation when uploading a Device Pack. An attacker could exploit this vulnerability by altering the request that is sent when uploading a Device Pack. A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. | |
Title | Cisco Industrial Network Director Command Injection Vulnerability | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-11-15T15:21:32.540Z
Updated: 2024-11-15T21:16:54.959Z
Reserved: 2022-10-27T18:47:50.316Z
Link: CVE-2023-20036
Vulnrichment
Updated: 2024-11-15T21:16:47.315Z
NVD
Status : Awaiting Analysis
Published: 2024-11-15T16:15:24.950
Modified: 2024-11-18T17:11:56.587
Link: CVE-2023-20036
Redhat
No data.