CVE-2024-20366 (GCVE-0-2024-20366)

Vulnerability from cvelistv5 – Published: 2024-05-15 17:25 – Updated: 2024-08-01 21:59
VLAI?
Summary
A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.
CWE
  • CWE-73 - External Control of File Name or Path
Assigner
Impacted products
Vendor Product Version
Cisco Cisco Network Services Orchestrator Affected: 5.4
Affected: 5.5
Affected: 5.6
Affected: 5.7
Affected: 5.8
Affected: 5.1.1.1
Affected: 5.1.1.3
Affected: 5.1.2
Affected: 5.2.0.3
Affected: 5.2.0.4
Affected: 5.2.1
Affected: 5.2.1.1
Affected: 5.2.3.2
Affected: 5.3.1
Affected: 5.3.4.3
Affected: 5.4.0.1
Affected: 5.4.0.2
Affected: 5.4.1
Affected: 5.4.1.1
Affected: 5.4.2
Affected: 5.4.3
Affected: 5.4.3.1
Affected: 5.4.3.2
Affected: 5.4.4.1
Affected: 5.4.4
Affected: 5.4.4.3
Affected: 5.4.3.4
Affected: 5.4.4.2
Affected: 5.4.3.3
Affected: 5.4.5.1
Affected: 5.4.2.1
Affected: 5.4.5.2
Affected: 5.4.5
Affected: 5.4.2.2
Affected: 5.4.6
Affected: 5.4.7
Affected: 5.4.7.1
Affected: 5.5.1
Affected: 5.5.2
Affected: 5.5.2.1
Affected: 5.5.2.2
Affected: 5.5.2.5
Affected: 5.5.2.3
Affected: 5.5.2.4
Affected: 5.5.2.9
Affected: 5.5.2.10
Affected: 5.5.3
Affected: 5.5.2.11
Affected: 5.5.2.6
Affected: 5.5.2.7
Affected: 5.5.2.8
Affected: 5.5.2.12
Affected: 5.5.4
Affected: 5.5.4.1
Affected: 5.5.3.1
Affected: 5.5.5
Affected: 5.5.6
Affected: 5.5.6.1
Affected: 5.5.7
Affected: 5.5.8
Affected: 5.5.10
Affected: 5.5.9
Affected: 5.6.1
Affected: 5.6.3
Affected: 5.6.3.1
Affected: 5.6.2
Affected: 5.6.4
Affected: 5.6.5
Affected: 5.6.6
Affected: 5.6.6.1
Affected: 5.6.7
Affected: 5.6.7.1
Affected: 5.6.7.2
Affected: 5.6.8
Affected: 5.6.8.1
Affected: 5.6.9
Affected: 5.6.10
Affected: 5.6.11
Affected: 5.6.12
Affected: 5.6.13
Affected: 5.6.14
Affected: 5.6.14.1
Affected: 5.7.1.1
Affected: 5.7.1
Affected: 5.7.2
Affected: 5.7.2.1
Affected: 5.7.3
Affected: 5.7.4
Affected: 5.7.5
Affected: 5.7.5.1
Affected: 5.7.6
Affected: 5.7.6.1
Affected: 5.7.6.2
Affected: 5.7.7
Affected: 5.7.8
Affected: 5.7.10
Affected: 5.7.10.1
Affected: 5.7.10.2
Affected: 5.7.11
Affected: 5.7.12
Affected: 5.7.13
Affected: 5.7.14
Affected: 5.7.15.1
Affected: 5.7.6.3
Affected: 5.7.8.1
Affected: 5.7.9
Affected: 5.7.9.1
Affected: 5.8.1
Affected: 5.8.2
Affected: 5.8.2.1
Affected: 5.8.3
Affected: 5.8.4
Affected: 5.8.5
Affected: 5.8.10
Affected: 5.8.11
Affected: 5.8.12
Affected: 5.8.6
Affected: 5.8.7
Affected: 5.8.8
Affected: 5.8.9
Affected: 6.0
Affected: 6.1
Affected: 6.2
Affected: 6.0.1
Affected: 6.0.1.1
Affected: 6.0.10
Affected: 6.0.11
Affected: 6.0.2
Affected: 6.0.3
Affected: 6.0.4
Affected: 6.0.5
Affected: 6.0.6
Affected: 6.0.7
Affected: 6.0.8
Affected: 6.0.9
Affected: 6.1.1
Affected: 6.1.2
Affected: 6.1.2.1
Affected: 6.1.3
Affected: 6.1.3.1
Affected: 6.1.3.2
Affected: 6.1.4
Affected: 6.1.5
Affected: 6.1.6
Affected: 6.1.6.1
Affected: 6.1.7
Affected: 6.1.7.1
Affected: 6.2.2
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.2.2",
                "status": "affected",
                "version": "5.1.1.1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20366",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-15T18:43:57.383617Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:26.335Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Network Services Orchestrator",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "status": "affected",
              "version": "5.5"
            },
            {
              "status": "affected",
              "version": "5.6"
            },
            {
              "status": "affected",
              "version": "5.7"
            },
            {
              "status": "affected",
              "version": "5.8"
            },
            {
              "status": "affected",
              "version": "5.1.1.1"
            },
            {
              "status": "affected",
              "version": "5.1.1.3"
            },
            {
              "status": "affected",
              "version": "5.1.2"
            },
            {
              "status": "affected",
              "version": "5.2.0.3"
            },
            {
              "status": "affected",
              "version": "5.2.0.4"
            },
            {
              "status": "affected",
              "version": "5.2.1"
            },
            {
              "status": "affected",
              "version": "5.2.1.1"
            },
            {
              "status": "affected",
              "version": "5.2.3.2"
            },
            {
              "status": "affected",
              "version": "5.3.1"
            },
            {
              "status": "affected",
              "version": "5.3.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.0.1"
            },
            {
              "status": "affected",
              "version": "5.4.0.2"
            },
            {
              "status": "affected",
              "version": "5.4.1"
            },
            {
              "status": "affected",
              "version": "5.4.1.1"
            },
            {
              "status": "affected",
              "version": "5.4.2"
            },
            {
              "status": "affected",
              "version": "5.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.3.1"
            },
            {
              "status": "affected",
              "version": "5.4.3.2"
            },
            {
              "status": "affected",
              "version": "5.4.4.1"
            },
            {
              "status": "affected",
              "version": "5.4.4"
            },
            {
              "status": "affected",
              "version": "5.4.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.3.4"
            },
            {
              "status": "affected",
              "version": "5.4.4.2"
            },
            {
              "status": "affected",
              "version": "5.4.3.3"
            },
            {
              "status": "affected",
              "version": "5.4.5.1"
            },
            {
              "status": "affected",
              "version": "5.4.2.1"
            },
            {
              "status": "affected",
              "version": "5.4.5.2"
            },
            {
              "status": "affected",
              "version": "5.4.5"
            },
            {
              "status": "affected",
              "version": "5.4.2.2"
            },
            {
              "status": "affected",
              "version": "5.4.6"
            },
            {
              "status": "affected",
              "version": "5.4.7"
            },
            {
              "status": "affected",
              "version": "5.4.7.1"
            },
            {
              "status": "affected",
              "version": "5.5.1"
            },
            {
              "status": "affected",
              "version": "5.5.2"
            },
            {
              "status": "affected",
              "version": "5.5.2.1"
            },
            {
              "status": "affected",
              "version": "5.5.2.2"
            },
            {
              "status": "affected",
              "version": "5.5.2.5"
            },
            {
              "status": "affected",
              "version": "5.5.2.3"
            },
            {
              "status": "affected",
              "version": "5.5.2.4"
            },
            {
              "status": "affected",
              "version": "5.5.2.9"
            },
            {
              "status": "affected",
              "version": "5.5.2.10"
            },
            {
              "status": "affected",
              "version": "5.5.3"
            },
            {
              "status": "affected",
              "version": "5.5.2.11"
            },
            {
              "status": "affected",
              "version": "5.5.2.6"
            },
            {
              "status": "affected",
              "version": "5.5.2.7"
            },
            {
              "status": "affected",
              "version": "5.5.2.8"
            },
            {
              "status": "affected",
              "version": "5.5.2.12"
            },
            {
              "status": "affected",
              "version": "5.5.4"
            },
            {
              "status": "affected",
              "version": "5.5.4.1"
            },
            {
              "status": "affected",
              "version": "5.5.3.1"
            },
            {
              "status": "affected",
              "version": "5.5.5"
            },
            {
              "status": "affected",
              "version": "5.5.6"
            },
            {
              "status": "affected",
              "version": "5.5.6.1"
            },
            {
              "status": "affected",
              "version": "5.5.7"
            },
            {
              "status": "affected",
              "version": "5.5.8"
            },
            {
              "status": "affected",
              "version": "5.5.10"
            },
            {
              "status": "affected",
              "version": "5.5.9"
            },
            {
              "status": "affected",
              "version": "5.6.1"
            },
            {
              "status": "affected",
              "version": "5.6.3"
            },
            {
              "status": "affected",
              "version": "5.6.3.1"
            },
            {
              "status": "affected",
              "version": "5.6.2"
            },
            {
              "status": "affected",
              "version": "5.6.4"
            },
            {
              "status": "affected",
              "version": "5.6.5"
            },
            {
              "status": "affected",
              "version": "5.6.6"
            },
            {
              "status": "affected",
              "version": "5.6.6.1"
            },
            {
              "status": "affected",
              "version": "5.6.7"
            },
            {
              "status": "affected",
              "version": "5.6.7.1"
            },
            {
              "status": "affected",
              "version": "5.6.7.2"
            },
            {
              "status": "affected",
              "version": "5.6.8"
            },
            {
              "status": "affected",
              "version": "5.6.8.1"
            },
            {
              "status": "affected",
              "version": "5.6.9"
            },
            {
              "status": "affected",
              "version": "5.6.10"
            },
            {
              "status": "affected",
              "version": "5.6.11"
            },
            {
              "status": "affected",
              "version": "5.6.12"
            },
            {
              "status": "affected",
              "version": "5.6.13"
            },
            {
              "status": "affected",
              "version": "5.6.14"
            },
            {
              "status": "affected",
              "version": "5.6.14.1"
            },
            {
              "status": "affected",
              "version": "5.7.1.1"
            },
            {
              "status": "affected",
              "version": "5.7.1"
            },
            {
              "status": "affected",
              "version": "5.7.2"
            },
            {
              "status": "affected",
              "version": "5.7.2.1"
            },
            {
              "status": "affected",
              "version": "5.7.3"
            },
            {
              "status": "affected",
              "version": "5.7.4"
            },
            {
              "status": "affected",
              "version": "5.7.5"
            },
            {
              "status": "affected",
              "version": "5.7.5.1"
            },
            {
              "status": "affected",
              "version": "5.7.6"
            },
            {
              "status": "affected",
              "version": "5.7.6.1"
            },
            {
              "status": "affected",
              "version": "5.7.6.2"
            },
            {
              "status": "affected",
              "version": "5.7.7"
            },
            {
              "status": "affected",
              "version": "5.7.8"
            },
            {
              "status": "affected",
              "version": "5.7.10"
            },
            {
              "status": "affected",
              "version": "5.7.10.1"
            },
            {
              "status": "affected",
              "version": "5.7.10.2"
            },
            {
              "status": "affected",
              "version": "5.7.11"
            },
            {
              "status": "affected",
              "version": "5.7.12"
            },
            {
              "status": "affected",
              "version": "5.7.13"
            },
            {
              "status": "affected",
              "version": "5.7.14"
            },
            {
              "status": "affected",
              "version": "5.7.15.1"
            },
            {
              "status": "affected",
              "version": "5.7.6.3"
            },
            {
              "status": "affected",
              "version": "5.7.8.1"
            },
            {
              "status": "affected",
              "version": "5.7.9"
            },
            {
              "status": "affected",
              "version": "5.7.9.1"
            },
            {
              "status": "affected",
              "version": "5.8.1"
            },
            {
              "status": "affected",
              "version": "5.8.2"
            },
            {
              "status": "affected",
              "version": "5.8.2.1"
            },
            {
              "status": "affected",
              "version": "5.8.3"
            },
            {
              "status": "affected",
              "version": "5.8.4"
            },
            {
              "status": "affected",
              "version": "5.8.5"
            },
            {
              "status": "affected",
              "version": "5.8.10"
            },
            {
              "status": "affected",
              "version": "5.8.11"
            },
            {
              "status": "affected",
              "version": "5.8.12"
            },
            {
              "status": "affected",
              "version": "5.8.6"
            },
            {
              "status": "affected",
              "version": "5.8.7"
            },
            {
              "status": "affected",
              "version": "5.8.8"
            },
            {
              "status": "affected",
              "version": "5.8.9"
            },
            {
              "status": "affected",
              "version": "6.0"
            },
            {
              "status": "affected",
              "version": "6.1"
            },
            {
              "status": "affected",
              "version": "6.2"
            },
            {
              "status": "affected",
              "version": "6.0.1"
            },
            {
              "status": "affected",
              "version": "6.0.1.1"
            },
            {
              "status": "affected",
              "version": "6.0.10"
            },
            {
              "status": "affected",
              "version": "6.0.11"
            },
            {
              "status": "affected",
              "version": "6.0.2"
            },
            {
              "status": "affected",
              "version": "6.0.3"
            },
            {
              "status": "affected",
              "version": "6.0.4"
            },
            {
              "status": "affected",
              "version": "6.0.5"
            },
            {
              "status": "affected",
              "version": "6.0.6"
            },
            {
              "status": "affected",
              "version": "6.0.7"
            },
            {
              "status": "affected",
              "version": "6.0.8"
            },
            {
              "status": "affected",
              "version": "6.0.9"
            },
            {
              "status": "affected",
              "version": "6.1.1"
            },
            {
              "status": "affected",
              "version": "6.1.2"
            },
            {
              "status": "affected",
              "version": "6.1.2.1"
            },
            {
              "status": "affected",
              "version": "6.1.3"
            },
            {
              "status": "affected",
              "version": "6.1.3.1"
            },
            {
              "status": "affected",
              "version": "6.1.3.2"
            },
            {
              "status": "affected",
              "version": "6.1.4"
            },
            {
              "status": "affected",
              "version": "6.1.5"
            },
            {
              "status": "affected",
              "version": "6.1.6"
            },
            {
              "status": "affected",
              "version": "6.1.6.1"
            },
            {
              "status": "affected",
              "version": "6.1.7"
            },
            {
              "status": "affected",
              "version": "6.1.7.1"
            },
            {
              "status": "affected",
              "version": "6.2.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-73",
              "description": "External Control of File Name or Path",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-15T17:25:09.258Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D"
        }
      ],
      "source": {
        "advisory": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
        "defects": [
          "CSCwi92920"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20366",
    "datePublished": "2024-05-15T17:25:09.258Z",
    "dateReserved": "2023-11-08T15:08:07.652Z",
    "dateUpdated": "2024-08-01T21:59:42.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\\r\\n\\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el paquete de funciones Tail-f High Availability Cluster Communications (HCC) de Cisco Crosswork Network Services Orchestrator (NSO) podr\\u00eda permitir a un atacante local autenticado elevar los privilegios a root en un dispositivo afectado. Esta vulnerabilidad existe porque se utiliza una ruta de b\\u00fasqueda controlada por el usuario para localizar archivos ejecutables. Un atacante podr\\u00eda aprovechar esta vulnerabilidad configurando la aplicaci\\u00f3n de manera que provoque la ejecuci\\u00f3n de un archivo malicioso. Un exploit exitoso podr\\u00eda permitir al atacante ejecutar c\\u00f3digo arbitrario en un dispositivo afectado como usuario root. Para aprovechar esta vulnerabilidad, el atacante necesitar\\u00eda credenciales v\\u00e1lidas en un dispositivo afectado.\"}]",
      "id": "CVE-2024-20366",
      "lastModified": "2024-11-21T08:52:28.580",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
      "published": "2024-05-15T18:15:09.440",
      "references": "[{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-73\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20366\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2024-05-15T18:15:09.440\",\"lastModified\":\"2025-03-25T17:49:13.957\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\\r\\n\\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el paquete de funciones Tail-f High Availability Cluster Communications (HCC) de Cisco Crosswork Network Services Orchestrator (NSO) podr\u00eda permitir a un atacante local autenticado elevar los privilegios a root en un dispositivo afectado. Esta vulnerabilidad existe porque se utiliza una ruta de b\u00fasqueda controlada por el usuario para localizar archivos ejecutables. Un atacante podr\u00eda aprovechar esta vulnerabilidad configurando la aplicaci\u00f3n de manera que provoque la ejecuci\u00f3n de un archivo malicioso. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en un dispositivo afectado como usuario root. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales v\u00e1lidas en un dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0\",\"versionEndExcluding\":\"5.0.5\",\"matchCriteriaId\":\"2332A210-1906-4307-82E2-D146B4DDB170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:network_services_orchestrator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"6.0.2\",\"matchCriteriaId\":\"6BA7F497-6FDF-4AE9-B5C5-507BD0F9E463\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2024-05-15T17:25:09.258Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\\r\\n\\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.\"}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Network Services Orchestrator\", \"versions\": [{\"version\": \"5.4\", \"status\": \"affected\"}, {\"version\": \"5.5\", \"status\": \"affected\"}, {\"version\": \"5.6\", \"status\": \"affected\"}, {\"version\": \"5.7\", \"status\": \"affected\"}, {\"version\": \"5.8\", \"status\": \"affected\"}, {\"version\": \"5.1.1.1\", \"status\": \"affected\"}, {\"version\": \"5.1.1.3\", \"status\": \"affected\"}, {\"version\": \"5.1.2\", \"status\": \"affected\"}, {\"version\": \"5.2.0.3\", \"status\": \"affected\"}, {\"version\": \"5.2.0.4\", \"status\": \"affected\"}, {\"version\": \"5.2.1\", \"status\": \"affected\"}, {\"version\": \"5.2.1.1\", \"status\": \"affected\"}, {\"version\": \"5.2.3.2\", \"status\": \"affected\"}, {\"version\": \"5.3.1\", \"status\": \"affected\"}, {\"version\": \"5.3.4.3\", \"status\": \"affected\"}, {\"version\": \"5.4.0.1\", \"status\": \"affected\"}, {\"version\": \"5.4.0.2\", \"status\": \"affected\"}, {\"version\": \"5.4.1\", \"status\": \"affected\"}, {\"version\": \"5.4.1.1\", \"status\": \"affected\"}, {\"version\": \"5.4.2\", \"status\": \"affected\"}, {\"version\": \"5.4.3\", \"status\": \"affected\"}, {\"version\": \"5.4.3.1\", \"status\": \"affected\"}, {\"version\": \"5.4.3.2\", \"status\": \"affected\"}, {\"version\": \"5.4.4.1\", \"status\": \"affected\"}, {\"version\": \"5.4.4\", \"status\": \"affected\"}, {\"version\": \"5.4.4.3\", \"status\": \"affected\"}, {\"version\": \"5.4.3.4\", \"status\": \"affected\"}, {\"version\": \"5.4.4.2\", \"status\": \"affected\"}, {\"version\": \"5.4.3.3\", \"status\": \"affected\"}, {\"version\": \"5.4.5.1\", \"status\": \"affected\"}, {\"version\": \"5.4.2.1\", \"status\": \"affected\"}, {\"version\": \"5.4.5.2\", \"status\": \"affected\"}, {\"version\": \"5.4.5\", \"status\": \"affected\"}, {\"version\": \"5.4.2.2\", \"status\": \"affected\"}, {\"version\": \"5.4.6\", \"status\": \"affected\"}, {\"version\": \"5.4.7\", \"status\": \"affected\"}, {\"version\": \"5.4.7.1\", \"status\": \"affected\"}, {\"version\": \"5.5.1\", \"status\": \"affected\"}, {\"version\": \"5.5.2\", \"status\": \"affected\"}, {\"version\": \"5.5.2.1\", \"status\": \"affected\"}, {\"version\": \"5.5.2.2\", \"status\": \"affected\"}, {\"version\": \"5.5.2.5\", \"status\": \"affected\"}, {\"version\": \"5.5.2.3\", \"status\": \"affected\"}, {\"version\": \"5.5.2.4\", \"status\": \"affected\"}, {\"version\": \"5.5.2.9\", \"status\": \"affected\"}, {\"version\": \"5.5.2.10\", \"status\": \"affected\"}, {\"version\": \"5.5.3\", \"status\": \"affected\"}, {\"version\": \"5.5.2.11\", \"status\": \"affected\"}, {\"version\": \"5.5.2.6\", \"status\": \"affected\"}, {\"version\": \"5.5.2.7\", \"status\": \"affected\"}, {\"version\": \"5.5.2.8\", \"status\": \"affected\"}, {\"version\": \"5.5.2.12\", \"status\": \"affected\"}, {\"version\": \"5.5.4\", \"status\": \"affected\"}, {\"version\": \"5.5.4.1\", \"status\": \"affected\"}, {\"version\": \"5.5.3.1\", \"status\": \"affected\"}, {\"version\": \"5.5.5\", \"status\": \"affected\"}, {\"version\": \"5.5.6\", \"status\": \"affected\"}, {\"version\": \"5.5.6.1\", \"status\": \"affected\"}, {\"version\": \"5.5.7\", \"status\": \"affected\"}, {\"version\": \"5.5.8\", \"status\": \"affected\"}, {\"version\": \"5.5.10\", \"status\": \"affected\"}, {\"version\": \"5.5.9\", \"status\": \"affected\"}, {\"version\": \"5.6.1\", \"status\": \"affected\"}, {\"version\": \"5.6.3\", \"status\": \"affected\"}, {\"version\": \"5.6.3.1\", \"status\": \"affected\"}, {\"version\": \"5.6.2\", \"status\": \"affected\"}, {\"version\": \"5.6.4\", \"status\": \"affected\"}, {\"version\": \"5.6.5\", \"status\": \"affected\"}, {\"version\": \"5.6.6\", \"status\": \"affected\"}, {\"version\": \"5.6.6.1\", \"status\": \"affected\"}, {\"version\": \"5.6.7\", \"status\": \"affected\"}, {\"version\": \"5.6.7.1\", \"status\": \"affected\"}, {\"version\": \"5.6.7.2\", \"status\": \"affected\"}, {\"version\": \"5.6.8\", \"status\": \"affected\"}, {\"version\": \"5.6.8.1\", \"status\": \"affected\"}, {\"version\": \"5.6.9\", \"status\": \"affected\"}, {\"version\": \"5.6.10\", \"status\": \"affected\"}, {\"version\": \"5.6.11\", \"status\": \"affected\"}, {\"version\": \"5.6.12\", \"status\": \"affected\"}, {\"version\": \"5.6.13\", \"status\": \"affected\"}, {\"version\": \"5.6.14\", \"status\": \"affected\"}, {\"version\": \"5.6.14.1\", \"status\": \"affected\"}, {\"version\": \"5.7.1.1\", \"status\": \"affected\"}, {\"version\": \"5.7.1\", \"status\": \"affected\"}, {\"version\": \"5.7.2\", \"status\": \"affected\"}, {\"version\": \"5.7.2.1\", \"status\": \"affected\"}, {\"version\": \"5.7.3\", \"status\": \"affected\"}, {\"version\": \"5.7.4\", \"status\": \"affected\"}, {\"version\": \"5.7.5\", \"status\": \"affected\"}, {\"version\": \"5.7.5.1\", \"status\": \"affected\"}, {\"version\": \"5.7.6\", \"status\": \"affected\"}, {\"version\": \"5.7.6.1\", \"status\": \"affected\"}, {\"version\": \"5.7.6.2\", \"status\": \"affected\"}, {\"version\": \"5.7.7\", \"status\": \"affected\"}, {\"version\": \"5.7.8\", \"status\": \"affected\"}, {\"version\": \"5.7.10\", \"status\": \"affected\"}, {\"version\": \"5.7.10.1\", \"status\": \"affected\"}, {\"version\": \"5.7.10.2\", \"status\": \"affected\"}, {\"version\": \"5.7.11\", \"status\": \"affected\"}, {\"version\": \"5.7.12\", \"status\": \"affected\"}, {\"version\": \"5.7.13\", \"status\": \"affected\"}, {\"version\": \"5.7.14\", \"status\": \"affected\"}, {\"version\": \"5.7.15.1\", \"status\": \"affected\"}, {\"version\": \"5.7.6.3\", \"status\": \"affected\"}, {\"version\": \"5.7.8.1\", \"status\": \"affected\"}, {\"version\": \"5.7.9\", \"status\": \"affected\"}, {\"version\": \"5.7.9.1\", \"status\": \"affected\"}, {\"version\": \"5.8.1\", \"status\": \"affected\"}, {\"version\": \"5.8.2\", \"status\": \"affected\"}, {\"version\": \"5.8.2.1\", \"status\": \"affected\"}, {\"version\": \"5.8.3\", \"status\": \"affected\"}, {\"version\": \"5.8.4\", \"status\": \"affected\"}, {\"version\": \"5.8.5\", \"status\": \"affected\"}, {\"version\": \"5.8.10\", \"status\": \"affected\"}, {\"version\": \"5.8.11\", \"status\": \"affected\"}, {\"version\": \"5.8.12\", \"status\": \"affected\"}, {\"version\": \"5.8.6\", \"status\": \"affected\"}, {\"version\": \"5.8.7\", \"status\": \"affected\"}, {\"version\": \"5.8.8\", \"status\": \"affected\"}, {\"version\": \"5.8.9\", \"status\": \"affected\"}, {\"version\": \"6.0\", \"status\": \"affected\"}, {\"version\": \"6.1\", \"status\": \"affected\"}, {\"version\": \"6.2\", \"status\": \"affected\"}, {\"version\": \"6.0.1\", \"status\": \"affected\"}, {\"version\": \"6.0.1.1\", \"status\": \"affected\"}, {\"version\": \"6.0.10\", \"status\": \"affected\"}, {\"version\": \"6.0.11\", \"status\": \"affected\"}, {\"version\": \"6.0.2\", \"status\": \"affected\"}, {\"version\": \"6.0.3\", \"status\": \"affected\"}, {\"version\": \"6.0.4\", \"status\": \"affected\"}, {\"version\": \"6.0.5\", \"status\": \"affected\"}, {\"version\": \"6.0.6\", \"status\": \"affected\"}, {\"version\": \"6.0.7\", \"status\": \"affected\"}, {\"version\": \"6.0.8\", \"status\": \"affected\"}, {\"version\": \"6.0.9\", \"status\": \"affected\"}, {\"version\": \"6.1.1\", \"status\": \"affected\"}, {\"version\": \"6.1.2\", \"status\": \"affected\"}, {\"version\": \"6.1.2.1\", \"status\": \"affected\"}, {\"version\": \"6.1.3\", \"status\": \"affected\"}, {\"version\": \"6.1.3.1\", \"status\": \"affected\"}, {\"version\": \"6.1.3.2\", \"status\": \"affected\"}, {\"version\": \"6.1.4\", \"status\": \"affected\"}, {\"version\": \"6.1.5\", \"status\": \"affected\"}, {\"version\": \"6.1.6\", \"status\": \"affected\"}, {\"version\": \"6.1.6.1\", \"status\": \"affected\"}, {\"version\": \"6.1.7\", \"status\": \"affected\"}, {\"version\": \"6.1.7.1\", \"status\": \"affected\"}, {\"version\": \"6.2.2\", \"status\": \"affected\"}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"External Control of File Name or Path\", \"type\": \"cwe\", \"cweId\": \"CWE-73\"}]}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\", \"name\": \"cisco-sa-nso-hcc-priv-esc-OWBWCs5D\"}], \"metrics\": [{\"format\": \"cvssV3_1\", \"cvssV3_1\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"source\": {\"advisory\": \"cisco-sa-nso-hcc-priv-esc-OWBWCs5D\", \"discovery\": \"EXTERNAL\", \"defects\": [\"CSCwi92920\"]}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-20366\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-15T18:43:57.383617Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.1:*:*:*:*:*:*:*\"], \"vendor\": \"cisco\", \"product\": \"network_services_orchestrator\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.1.1.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.2.2\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-15T18:49:57.607Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-20366\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"cisco\", \"dateReserved\": \"2023-11-08T15:08:07.652Z\", \"datePublished\": \"2024-05-15T17:25:09.258Z\", \"dateUpdated\": \"2024-06-04T17:40:26.335Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…