A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges.
Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
Exploitation None
Automatable No
Technical Impact Total
Affected Vendors & Products
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
AND |
|
No data.
References
History
Thu, 24 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco ios Xe Software
|
|
CPEs | cpe:2.3:a:cisco:ios_xe_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco ios Xe Software
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2023-09-27T17:19:17.664Z
Updated: 2024-10-24T16:43:47.359Z
Reserved: 2022-10-27T18:47:50.369Z
Link: CVE-2023-20231
Vulnrichment
Updated: 2024-08-02T09:05:36.687Z
NVD
Status : Modified
Published: 2023-09-27T18:15:11.430
Modified: 2024-01-25T17:15:39.237
Link: CVE-2023-20231
Redhat
No data.