CVE-2023-20154
Vulnerability from cvelistv5
Published
2024-11-15 14:54
Modified
2024-11-15 16:04
Severity ?
EPSS score ?
Summary
Cisco Modeling Labs External Authentication Bypass Vulnerability
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | Cisco Modeling Labs |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:modeling_labs:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:modeling_labs:2.5.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "modeling_labs", "vendor": "cisco", "versions": [ { "status": "affected", "version": "2.3.0" }, { "status": "affected", "version": "2.3.1" }, { "status": "affected", "version": "2.4.0" }, { "status": "affected", "version": "2.4.1" }, { "status": "affected", "version": "2.5.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20154", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T15:47:18.198959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T16:04:16.020Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco Modeling Labs", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.3.0" }, { "status": "affected", "version": "2.3.1" }, { "status": "affected", "version": "2.4.0" }, { "status": "affected", "version": "2.4.1" }, { "status": "affected", "version": "2.5.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the external authentication mechanism of Cisco Modeling Labs could allow an unauthenticated, remote attacker to access the web interface with administrative privileges.\r\n\r\nThis vulnerability is due to the improper handling of certain messages that are returned by the associated external authentication server. An attacker could exploit this vulnerability by logging in to the web interface of an affected server. Under certain conditions, the authentication mechanism would be bypassed and the attacker would be logged in as an administrator. A successful exploit could allow the attacker to obtain administrative privileges on the web interface of an affected server, including the ability to access and modify every simulation and all user-created data. To exploit this vulnerability, the attacker would need valid user credentials that are stored on the associated external authentication server.\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-305", "description": "Authentication Bypass by Primary Weakness", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T14:54:34.191Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-cml-auth-bypass-4fUCCeG5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cml-auth-bypass-4fUCCeG5" } ], "source": { "advisory": "cisco-sa-cml-auth-bypass-4fUCCeG5", "defects": [ "CSCwe60374" ], "discovery": "INTERNAL" }, "title": "Cisco Modeling Labs External Authentication Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20154", "datePublished": "2024-11-15T14:54:34.191Z", "dateReserved": "2022-10-27T18:47:50.359Z", "dateUpdated": "2024-11-15T16:04:16.020Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-20154\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-11-15T15:15:05.697\",\"lastModified\":\"2024-11-18T17:11:56.587\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the external authentication mechanism of Cisco Modeling Labs could allow an unauthenticated, remote attacker to access the web interface with administrative privileges.\\r\\n\\r\\nThis vulnerability is due to the improper handling of certain messages that are returned by the associated external authentication server. An attacker could exploit this vulnerability by logging in to the web interface of an affected server. Under certain conditions, the authentication mechanism would be bypassed and the attacker would be logged in as an administrator. A successful exploit could allow the attacker to obtain administrative privileges on the web interface of an affected server, including the ability to access and modify every simulation and all user-created data. To exploit this vulnerability, the attacker would need valid user credentials that are stored on the associated external authentication server.\\r\\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el mecanismo de autenticaci\u00f3n externa de Cisco Modeling Labs podr\u00eda permitir que un atacante remoto no autenticado acceda a la interfaz web con privilegios administrativos. Esta vulnerabilidad se debe al manejo inadecuado de ciertos mensajes que devuelve el servidor de autenticaci\u00f3n externo asociado. Un atacante podr\u00eda aprovechar esta vulnerabilidad iniciando sesi\u00f3n en la interfaz web de un servidor afectado. En determinadas condiciones, se omitir\u00eda el mecanismo de autenticaci\u00f3n y el atacante iniciar\u00eda sesi\u00f3n como administrador. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante obtener privilegios administrativos en la interfaz web de un servidor afectado, incluida la capacidad de acceder y modificar todas las simulaciones y todos los datos creados por el usuario. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales de usuario v\u00e1lidas que est\u00e9n almacenadas en el servidor de autenticaci\u00f3n externo asociado. Cisco ha publicado actualizaciones de software que solucionan esta vulnerabilidad. Existen workarounds que solucionan esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-305\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cml-auth-bypass-4fUCCeG5\",\"source\":\"ykramarz@cisco.com\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.