A vulnerability in the web UI of Cisco IND could allow an authenticated, remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. This vulnerability is due to improper input validation when uploading a Device Pack. An attacker could exploit this vulnerability by altering the request that is sent when uploading a Device Pack. A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
History

Fri, 15 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco industrial Network Director
CPEs cpe:2.3:a:cisco:industrial_network_director:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco industrial Network Director
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 15:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web UI of Cisco IND could allow an authenticated, remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system of an affected device. This vulnerability is due to improper input validation when uploading a Device Pack. An attacker could exploit this vulnerability by altering the request that is sent when uploading a Device Pack. A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Title Cisco Industrial Network Director Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-15T15:21:32.540Z

Updated: 2024-11-15T21:16:54.959Z

Reserved: 2022-10-27T18:47:50.316Z

Link: CVE-2023-20036

cve-icon Vulnrichment

Updated: 2024-11-15T21:16:47.315Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-15T16:15:24.950

Modified: 2024-11-18T17:11:56.587

Link: CVE-2023-20036

cve-icon Redhat

No data.