cve-2024-20366
Vulnerability from cvelistv5
Published
2024-05-15 17:25
Modified
2024-08-01 21:59
Summary
A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "network_services_orchestrator",
            "vendor": "cisco",
            "versions": [
              {
                "lessThanOrEqual": "6.2.2",
                "status": "affected",
                "version": "5.1.1.1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20366",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-15T18:43:57.383617Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:40:26.335Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:42.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Network Services Orchestrator",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "5.4"
            },
            {
              "status": "affected",
              "version": "5.5"
            },
            {
              "status": "affected",
              "version": "5.6"
            },
            {
              "status": "affected",
              "version": "5.7"
            },
            {
              "status": "affected",
              "version": "5.8"
            },
            {
              "status": "affected",
              "version": "5.1.1.1"
            },
            {
              "status": "affected",
              "version": "5.1.1.3"
            },
            {
              "status": "affected",
              "version": "5.1.2"
            },
            {
              "status": "affected",
              "version": "5.2.0.3"
            },
            {
              "status": "affected",
              "version": "5.2.0.4"
            },
            {
              "status": "affected",
              "version": "5.2.1"
            },
            {
              "status": "affected",
              "version": "5.2.1.1"
            },
            {
              "status": "affected",
              "version": "5.2.3.2"
            },
            {
              "status": "affected",
              "version": "5.3.1"
            },
            {
              "status": "affected",
              "version": "5.3.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.0.1"
            },
            {
              "status": "affected",
              "version": "5.4.0.2"
            },
            {
              "status": "affected",
              "version": "5.4.1"
            },
            {
              "status": "affected",
              "version": "5.4.1.1"
            },
            {
              "status": "affected",
              "version": "5.4.2"
            },
            {
              "status": "affected",
              "version": "5.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.3.1"
            },
            {
              "status": "affected",
              "version": "5.4.3.2"
            },
            {
              "status": "affected",
              "version": "5.4.4.1"
            },
            {
              "status": "affected",
              "version": "5.4.4"
            },
            {
              "status": "affected",
              "version": "5.4.4.3"
            },
            {
              "status": "affected",
              "version": "5.4.3.4"
            },
            {
              "status": "affected",
              "version": "5.4.4.2"
            },
            {
              "status": "affected",
              "version": "5.4.3.3"
            },
            {
              "status": "affected",
              "version": "5.4.5.1"
            },
            {
              "status": "affected",
              "version": "5.4.2.1"
            },
            {
              "status": "affected",
              "version": "5.4.5.2"
            },
            {
              "status": "affected",
              "version": "5.4.5"
            },
            {
              "status": "affected",
              "version": "5.4.2.2"
            },
            {
              "status": "affected",
              "version": "5.4.6"
            },
            {
              "status": "affected",
              "version": "5.4.7"
            },
            {
              "status": "affected",
              "version": "5.4.7.1"
            },
            {
              "status": "affected",
              "version": "5.5.1"
            },
            {
              "status": "affected",
              "version": "5.5.2"
            },
            {
              "status": "affected",
              "version": "5.5.2.1"
            },
            {
              "status": "affected",
              "version": "5.5.2.2"
            },
            {
              "status": "affected",
              "version": "5.5.2.5"
            },
            {
              "status": "affected",
              "version": "5.5.2.3"
            },
            {
              "status": "affected",
              "version": "5.5.2.4"
            },
            {
              "status": "affected",
              "version": "5.5.2.9"
            },
            {
              "status": "affected",
              "version": "5.5.2.10"
            },
            {
              "status": "affected",
              "version": "5.5.3"
            },
            {
              "status": "affected",
              "version": "5.5.2.11"
            },
            {
              "status": "affected",
              "version": "5.5.2.6"
            },
            {
              "status": "affected",
              "version": "5.5.2.7"
            },
            {
              "status": "affected",
              "version": "5.5.2.8"
            },
            {
              "status": "affected",
              "version": "5.5.2.12"
            },
            {
              "status": "affected",
              "version": "5.5.4"
            },
            {
              "status": "affected",
              "version": "5.5.4.1"
            },
            {
              "status": "affected",
              "version": "5.5.3.1"
            },
            {
              "status": "affected",
              "version": "5.5.5"
            },
            {
              "status": "affected",
              "version": "5.5.6"
            },
            {
              "status": "affected",
              "version": "5.5.6.1"
            },
            {
              "status": "affected",
              "version": "5.5.7"
            },
            {
              "status": "affected",
              "version": "5.5.8"
            },
            {
              "status": "affected",
              "version": "5.5.10"
            },
            {
              "status": "affected",
              "version": "5.5.9"
            },
            {
              "status": "affected",
              "version": "5.6.1"
            },
            {
              "status": "affected",
              "version": "5.6.3"
            },
            {
              "status": "affected",
              "version": "5.6.3.1"
            },
            {
              "status": "affected",
              "version": "5.6.2"
            },
            {
              "status": "affected",
              "version": "5.6.4"
            },
            {
              "status": "affected",
              "version": "5.6.5"
            },
            {
              "status": "affected",
              "version": "5.6.6"
            },
            {
              "status": "affected",
              "version": "5.6.6.1"
            },
            {
              "status": "affected",
              "version": "5.6.7"
            },
            {
              "status": "affected",
              "version": "5.6.7.1"
            },
            {
              "status": "affected",
              "version": "5.6.7.2"
            },
            {
              "status": "affected",
              "version": "5.6.8"
            },
            {
              "status": "affected",
              "version": "5.6.8.1"
            },
            {
              "status": "affected",
              "version": "5.6.9"
            },
            {
              "status": "affected",
              "version": "5.6.10"
            },
            {
              "status": "affected",
              "version": "5.6.11"
            },
            {
              "status": "affected",
              "version": "5.6.12"
            },
            {
              "status": "affected",
              "version": "5.6.13"
            },
            {
              "status": "affected",
              "version": "5.6.14"
            },
            {
              "status": "affected",
              "version": "5.6.14.1"
            },
            {
              "status": "affected",
              "version": "5.7.1.1"
            },
            {
              "status": "affected",
              "version": "5.7.1"
            },
            {
              "status": "affected",
              "version": "5.7.2"
            },
            {
              "status": "affected",
              "version": "5.7.2.1"
            },
            {
              "status": "affected",
              "version": "5.7.3"
            },
            {
              "status": "affected",
              "version": "5.7.4"
            },
            {
              "status": "affected",
              "version": "5.7.5"
            },
            {
              "status": "affected",
              "version": "5.7.5.1"
            },
            {
              "status": "affected",
              "version": "5.7.6"
            },
            {
              "status": "affected",
              "version": "5.7.6.1"
            },
            {
              "status": "affected",
              "version": "5.7.6.2"
            },
            {
              "status": "affected",
              "version": "5.7.7"
            },
            {
              "status": "affected",
              "version": "5.7.8"
            },
            {
              "status": "affected",
              "version": "5.7.10"
            },
            {
              "status": "affected",
              "version": "5.7.10.1"
            },
            {
              "status": "affected",
              "version": "5.7.10.2"
            },
            {
              "status": "affected",
              "version": "5.7.11"
            },
            {
              "status": "affected",
              "version": "5.7.12"
            },
            {
              "status": "affected",
              "version": "5.7.13"
            },
            {
              "status": "affected",
              "version": "5.7.14"
            },
            {
              "status": "affected",
              "version": "5.7.15.1"
            },
            {
              "status": "affected",
              "version": "5.7.6.3"
            },
            {
              "status": "affected",
              "version": "5.7.8.1"
            },
            {
              "status": "affected",
              "version": "5.7.9"
            },
            {
              "status": "affected",
              "version": "5.7.9.1"
            },
            {
              "status": "affected",
              "version": "5.8.1"
            },
            {
              "status": "affected",
              "version": "5.8.2"
            },
            {
              "status": "affected",
              "version": "5.8.2.1"
            },
            {
              "status": "affected",
              "version": "5.8.3"
            },
            {
              "status": "affected",
              "version": "5.8.4"
            },
            {
              "status": "affected",
              "version": "5.8.5"
            },
            {
              "status": "affected",
              "version": "5.8.10"
            },
            {
              "status": "affected",
              "version": "5.8.11"
            },
            {
              "status": "affected",
              "version": "5.8.12"
            },
            {
              "status": "affected",
              "version": "5.8.6"
            },
            {
              "status": "affected",
              "version": "5.8.7"
            },
            {
              "status": "affected",
              "version": "5.8.8"
            },
            {
              "status": "affected",
              "version": "5.8.9"
            },
            {
              "status": "affected",
              "version": "6.0"
            },
            {
              "status": "affected",
              "version": "6.1"
            },
            {
              "status": "affected",
              "version": "6.2"
            },
            {
              "status": "affected",
              "version": "6.0.1"
            },
            {
              "status": "affected",
              "version": "6.0.1.1"
            },
            {
              "status": "affected",
              "version": "6.0.10"
            },
            {
              "status": "affected",
              "version": "6.0.11"
            },
            {
              "status": "affected",
              "version": "6.0.2"
            },
            {
              "status": "affected",
              "version": "6.0.3"
            },
            {
              "status": "affected",
              "version": "6.0.4"
            },
            {
              "status": "affected",
              "version": "6.0.5"
            },
            {
              "status": "affected",
              "version": "6.0.6"
            },
            {
              "status": "affected",
              "version": "6.0.7"
            },
            {
              "status": "affected",
              "version": "6.0.8"
            },
            {
              "status": "affected",
              "version": "6.0.9"
            },
            {
              "status": "affected",
              "version": "6.1.1"
            },
            {
              "status": "affected",
              "version": "6.1.2"
            },
            {
              "status": "affected",
              "version": "6.1.2.1"
            },
            {
              "status": "affected",
              "version": "6.1.3"
            },
            {
              "status": "affected",
              "version": "6.1.3.1"
            },
            {
              "status": "affected",
              "version": "6.1.3.2"
            },
            {
              "status": "affected",
              "version": "6.1.4"
            },
            {
              "status": "affected",
              "version": "6.1.5"
            },
            {
              "status": "affected",
              "version": "6.1.6"
            },
            {
              "status": "affected",
              "version": "6.1.6.1"
            },
            {
              "status": "affected",
              "version": "6.1.7"
            },
            {
              "status": "affected",
              "version": "6.1.7.1"
            },
            {
              "status": "affected",
              "version": "6.2.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-73",
              "description": "External Control of File Name or Path",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-15T17:25:09.258Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D"
        }
      ],
      "source": {
        "advisory": "cisco-sa-nso-hcc-priv-esc-OWBWCs5D",
        "defects": [
          "CSCwi92920"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20366",
    "datePublished": "2024-05-15T17:25:09.258Z",
    "dateReserved": "2023-11-08T15:08:07.652Z",
    "dateUpdated": "2024-08-01T21:59:42.835Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-20366\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2024-05-15T18:15:09.440\",\"lastModified\":\"2024-05-15T18:35:11.453\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.\\r\\n\\r This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el paquete de funciones Tail-f High Availability Cluster Communications (HCC) de Cisco Crosswork Network Services Orchestrator (NSO) podr\u00eda permitir a un atacante local autenticado elevar los privilegios a root en un dispositivo afectado. Esta vulnerabilidad existe porque se utiliza una ruta de b\u00fasqueda controlada por el usuario para localizar archivos ejecutables. Un atacante podr\u00eda aprovechar esta vulnerabilidad configurando la aplicaci\u00f3n de manera que provoque la ejecuci\u00f3n de un archivo malicioso. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en un dispositivo afectado como usuario root. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda credenciales v\u00e1lidas en un dispositivo afectado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-73\"}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D\",\"source\":\"ykramarz@cisco.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.