The vulnerability occurs because there is no validation of parameters when a specific CLI command is used. An attacker could exploit this vulnerability by authenticating to an affected device and using the command at the CLI. A successful exploit could allow the attacker to overwrite any file on the disk of the affected device, including system files. The attacker must have valid administrative credentials on the affected device to exploit this vulnerability.
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact None
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00019.
Key SSVC decision points have not yet been added.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Cisco | Cisco Adaptive Security Appliance (ASA) Software | affected |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Cisco | Cisco Firepower Threat Defense Software | affected |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Cisco | Cisco Firepower Extensible Operating System (FXOS) | affected |
|
Configuration 1 [-]
| AND |
|
No data.
No data.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Firepower 1000
Subscribe
Firepower 1010
Subscribe
Firepower 1020
Subscribe
Firepower 1030
Subscribe
Firepower 1040
Subscribe
Firepower 2100
Subscribe
Firepower 2110
Subscribe
Firepower 2120
Subscribe
Firepower 2130
Subscribe
Firepower 2140
Subscribe
Firepower 4100
Subscribe
Firepower 4110
Subscribe
Firepower 4110 Next-generation Firewall
Subscribe
Firepower 4112
Subscribe
Firepower 4115
Subscribe
Firepower 4120
Subscribe
Firepower 4120 Next-generation Firewall
Subscribe
Firepower 4125
Subscribe
Firepower 4140
Subscribe
Firepower 4140 Next-generation Firewall
Subscribe
Firepower 4145
Subscribe
Firepower 4150
Subscribe
Firepower 4150 Next-generation Firewall
Subscribe
Firepower 9300
Subscribe
Firepower 9300 Security Appliance
Subscribe
Firepower 9300 Sm-24
Subscribe
Firepower 9300 Sm-36
Subscribe
Firepower 9300 Sm-40
Subscribe
Firepower 9300 Sm-44
Subscribe
Firepower 9300 Sm-44 X 3
Subscribe
Firepower 9300 Sm-48
Subscribe
Firepower 9300 Sm-56
Subscribe
Firepower 9300 Sm-56 X 3
Subscribe
Firepower 9300 With 1 Sm-24 Module
Subscribe
Firepower 9300 With 1 Sm-36 Module
Subscribe
Firepower 9300 With 1 Sm-44 Module
Subscribe
Firepower 9300 With 3 Sm-44 Module
Subscribe
Firepower Extensible Operating System
Subscribe
Secure Firewall 3105
Subscribe
Secure Firewall 3110
Subscribe
Secure Firewall 3120
Subscribe
Secure Firewall 3130
Subscribe
Secure Firewall 3140
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24413 | A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to create a file or overwrite any file on the filesystem of an affected device, including system files. The vulnerability occurs because there is no validation of parameters when a specific CLI command is used. An attacker could exploit this vulnerability by authenticating to an affected device and using the command at the CLI. A successful exploit could allow the attacker to overwrite any file on the disk of the affected device, including system files. The attacker must have valid administrative credentials on the affected device to exploit this vulnerability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-02T09:05:35.918Z
Reserved: 2022-10-27T18:47:50.369Z
Link: CVE-2023-20234
No data.
Status : Modified
Published: 2023-08-23T19:15:08.277
Modified: 2024-11-21T07:40:57.383
Link: CVE-2023-20234
No data.
OpenCVE Enrichment
No data.
EUVD