A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.
This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Catalyst Ie3200 Rugged Switch
Subscribe
Catalyst Ie3300 Rugged Switch
Subscribe
Catalyst Ie3400 Rugged Switch
Subscribe
Catalyst Ir1101
Subscribe
Catalyst Ir1821-k9
Subscribe
Catalyst Ir1831-k9
Subscribe
Catalyst Ir1833-k9
Subscribe
Catalyst Ir1835-k9
Subscribe
Catalyst Ir8140h-k9
Subscribe
Catalyst Ir8140h-p-k9
Subscribe
Catalyst Ir8340-k9
Subscribe
Ess-3300-24t-con-a
Subscribe
Ess-3300-24t-con-e
Subscribe
Ess-3300-24t-ncp-a
Subscribe
Ess-3300-24t-ncp-e
Subscribe
Ess-3300-con-a
Subscribe
Ess-3300-con-e
Subscribe
Ess-3300-ncp-a
Subscribe
Ess-3300-ncp-e
Subscribe
Ios Xe
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24414 | A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user. This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-08-02T09:05:36.672Z
Reserved: 2022-10-27T18:47:50.369Z
Link: CVE-2023-20235
No data.
Status : Modified
Published: 2023-10-04T17:15:09.917
Modified: 2024-11-21T07:40:57.567
Link: CVE-2023-20235
No data.
OpenCVE Enrichment
No data.
EUVD