A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.

This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.

Project Subscriptions

Vendors Products
Catalyst Ie3200 Rugged Switch Subscribe
Catalyst Ie3300 Rugged Switch Subscribe
Catalyst Ie3400 Rugged Switch Subscribe
Catalyst Ir1101 Subscribe
Catalyst Ir1821-k9 Subscribe
Catalyst Ir1831-k9 Subscribe
Catalyst Ir1833-k9 Subscribe
Catalyst Ir1835-k9 Subscribe
Catalyst Ir8140h-k9 Subscribe
Catalyst Ir8140h-p-k9 Subscribe
Catalyst Ir8340-k9 Subscribe
Ess-3300-24t-con-a Subscribe
Ess-3300-24t-con-e Subscribe
Ess-3300-24t-ncp-a Subscribe
Ess-3300-24t-ncp-e Subscribe
Ess-3300-con-a Subscribe
Ess-3300-con-e Subscribe
Ess-3300-ncp-a Subscribe
Ess-3300-ncp-e Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24414 A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-02T09:05:36.672Z

Reserved: 2022-10-27T18:47:50.369Z

Link: CVE-2023-20235

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-04T17:15:09.917

Modified: 2024-11-21T07:40:57.567

Link: CVE-2023-20235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses