Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-20236", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2022-10-27T18:47:50.370Z", "datePublished": "2023-09-13T16:39:19.418Z", "dateUpdated": "2024-10-23T19:10:48.388Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-08-07T19:50:10.951Z"}, "descriptions": [{"lang": "en", "value": "A vulnerability in the iPXE boot function of Cisco IOS XR software could allow an authenticated, local attacker to install an unverified software image on an affected device.\r\n\r This vulnerability is due to insufficient image verification. An attacker could exploit this vulnerability by manipulating the boot parameters for image verification during the iPXE boot process on an affected device. A successful exploit could allow the attacker to boot an unverified software image on the affected device."}], "affected": [{"vendor": "Cisco", "product": "Cisco IOS XR Software", "versions": [{"version": "5.2.0", "status": "affected"}, {"version": "5.2.1", "status": "affected"}, {"version": "5.2.2", "status": "affected"}, {"version": "5.2.4", "status": "affected"}, {"version": "5.2.3", "status": "affected"}, {"version": "5.2.5", "status": "affected"}, {"version": "5.2.47", "status": "affected"}, {"version": "5.3.0", "status": "affected"}, {"version": "5.3.1", "status": "affected"}, {"version": "5.3.2", "status": "affected"}, {"version": "5.3.3", "status": "affected"}, {"version": "5.3.4", "status": "affected"}, {"version": "6.0.0", "status": "affected"}, {"version": "6.0.1", "status": "affected"}, {"version": "6.0.2", "status": "affected"}, {"version": "6.1.1", "status": "affected"}, {"version": "6.1.2", "status": "affected"}, {"version": "6.1.3", "status": "affected"}, {"version": "6.1.4", "status": "affected"}, {"version": "6.1.12", "status": "affected"}, {"version": "6.1.22", "status": "affected"}, {"version": "6.1.32", "status": "affected"}, {"version": "6.1.36", "status": "affected"}, {"version": "6.1.42", "status": "affected"}, {"version": "6.2.1", "status": "affected"}, {"version": "6.2.2", "status": "affected"}, {"version": "6.2.3", "status": "affected"}, {"version": "6.2.25", "status": "affected"}, {"version": "6.2.11", "status": "affected"}, {"version": "6.3.2", "status": "affected"}, {"version": "6.3.3", "status": "affected"}, {"version": "6.3.15", "status": "affected"}, {"version": "6.4.1", "status": "affected"}, {"version": "6.4.2", "status": "affected"}, {"version": "6.4.3", "status": "affected"}, {"version": "6.5.1", "status": "affected"}, {"version": "6.5.2", "status": "affected"}, {"version": "6.5.3", "status": "affected"}, {"version": "6.5.25", "status": "affected"}, {"version": "6.5.26", "status": "affected"}, {"version": "6.5.28", "status": "affected"}, {"version": "6.5.29", "status": "affected"}, {"version": "6.5.32", "status": "affected"}, {"version": "6.5.33", "status": "affected"}, {"version": "6.6.2", "status": "affected"}, {"version": "6.6.3", "status": "affected"}, {"version": "6.6.25", "status": "affected"}, {"version": "6.6.4", "status": "affected"}, {"version": "7.0.1", "status": "affected"}, {"version": "7.0.2", "status": "affected"}, {"version": "7.0.12", "status": "affected"}, {"version": "7.0.14", "status": "affected"}, {"version": "7.1.1", "status": "affected"}, {"version": "7.1.15", "status": "affected"}, {"version": "7.1.2", "status": "affected"}, {"version": "7.1.3", "status": "affected"}, {"version": "6.7.1", "status": "affected"}, {"version": "6.7.2", "status": "affected"}, {"version": "6.7.3", "status": "affected"}, {"version": "6.7.4", "status": "affected"}, {"version": "7.2.0", "status": "affected"}, {"version": "7.2.1", "status": "affected"}, {"version": "7.2.2", "status": "affected"}, {"version": "7.3.1", "status": "affected"}, {"version": "7.3.15", "status": "affected"}, {"version": "7.3.2", "status": "affected"}, {"version": "7.3.3", "status": "affected"}, {"version": "7.3.5", "status": "affected"}, {"version": "7.4.1", "status": "affected"}, {"version": "7.4.2", "status": "affected"}, {"version": "6.8.1", "status": "affected"}, {"version": "6.8.2", "status": "affected"}, {"version": "7.5.1", "status": "affected"}, {"version": "7.5.3", "status": "affected"}, {"version": "7.5.2", "status": "affected"}, {"version": "7.5.4", "status": "affected"}, {"version": "7.6.1", "status": "affected"}, {"version": "7.6.2", "status": "affected"}, {"version": "7.7.1", "status": "affected"}, {"version": "7.7.2", "status": "affected"}, {"version": "7.7.21", "status": "affected"}, {"version": "6.9.1", "status": "affected"}, {"version": "6.9.2", "status": "affected"}, {"version": "7.8.1", "status": "affected"}, {"version": "7.8.2", "status": "affected"}, {"version": "7.9.1", "status": "affected"}, {"version": "7.9.2", "status": "affected"}]}], "problemTypes": [{"descriptions": [{"lang": "en", "description": "Improper Verification of Cryptographic Signature", "type": "cwe", "cweId": "CWE-347"}]}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB", "name": "cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB"}], "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 6.7, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH"}}], "exploits": [{"lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB", "discovery": "INTERNAL", "defects": ["CSCvz63925", "CSCvz63918", "CSCwe12502", "CSCvz63929", "CSCwi31568", "CSCwh78724", "CSCwi26526", "CSCwh70601", "CSCwh78727", "CSCwj83430", "CSCwj88475"]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T09:05:35.905Z"}, "title": "CVE Program Container", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB", "name": "cisco-sa-iosxr-ipxe-sigbypass-pymfyqgB", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "cisco", "product": "ios_xr_software", "cpes": ["cpe:2.3:o:cisco:ios_xr_software:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThanOrEqual": "7.9.2", "versionType": "custom"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2023-11-15T16:36:16.200980Z", "id": "CVE-2023-20236", "options": [{"Exploitation": "None"}, {"Automatable": "No"}, {"Technical Impact": "Total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-23T19:10:48.388Z"}}]}}