Action not permitted
Modal body text goes here.
Modal Title
Modal Body
FKIE_CVE-2023-20238
Vulnerability from fkie_nvd - Published: 2023-09-06 18:15 - Updated: 2024-11-21 07:40
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.
This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | broadworks_application_delivery_platform | ri.2023.06 | |
| cisco | broadworks_application_delivery_platform | ri.2023.07 | |
| cisco | broadworks_xtended_services_platform | * | |
| cisco | broadworks_xtended_services_platform | 2023.06 | |
| cisco | broadworks_xtended_services_platform | 2023.07 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:broadworks_application_delivery_platform:ri.2023.06:*:*:*:*:*:*:*",
"matchCriteriaId": "95D3C201-88EC-44F7-8ED2-6CFD726FAC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:broadworks_application_delivery_platform:ri.2023.07:*:*:*:*:*:*:*",
"matchCriteriaId": "94C37251-4CAB-499E-AFD0-4AAD78288A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:-:*:*:*",
"matchCriteriaId": "3DA39D01-BCC5-4B5E-A146-5CAEA4F9ED70",
"versionEndExcluding": "23.0.1075.ap384245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:broadworks_xtended_services_platform:2023.06:*:*:*:release_independent:*:*:*",
"matchCriteriaId": "FAA6AF4C-2CBF-4F59-B5DE-809CFE82DD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:broadworks_xtended_services_platform:2023.07:*:*:*:release_independent:*:*:*",
"matchCriteriaId": "07A9E1FF-7458-4035-AF12-056585F7DC6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.\r\n\r This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la implementaci\u00f3n del inicio de sesi\u00f3n \u00fanico (SSO) de Cisco BroadWorks Application Delivery Platform y Cisco BroadWorks Xtended Services Platform podr\u00eda permitir que un atacante remoto no autenticado falsifique las credenciales necesarias para acceder a un sistema afectado. Esta vulnerabilidad se debe al m\u00e9todo utilizado para validar los tokens de SSO. Un atacante podr\u00eda aprovechar esta vulnerabilidad autentic\u00e1ndose en la aplicaci\u00f3n con credenciales falsificadas. Un exploit exitoso podr\u00eda permitir al atacante cometer fraude telef\u00f3nico o ejecutar comandos en el nivel de privilegio de la cuenta falsificada. Si esa cuenta es una cuenta de administrador, el atacante tendr\u00eda la capacidad de ver informaci\u00f3n confidencial, modificar la configuraci\u00f3n del cliente o modificar la configuraci\u00f3n de otros usuarios. Para aprovechar esta vulnerabilidad, el atacante necesitar\u00eda una identificaci\u00f3n de usuario v\u00e1lida asociada con un sistema Cisco BroadWorks afectado."
}
],
"id": "CVE-2023-20238",
"lastModified": "2024-11-21T07:40:57.973",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-06T18:15:08.043",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-20238 (GCVE-0-2023-20238)
Vulnerability from cvelistv5 – Published: 2023-09-06 17:08 – Updated: 2024-10-23 19:41
VLAI?
EPSS
Summary
A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.
This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system.
Severity ?
10 (Critical)
CWE
- CWE-287 - Improper Authentication
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco BroadWorks |
Affected:
23.0
Affected: 23.0 ap383785 Affected: 23.0 ap382487 Affected: 23.0 ap381781 Affected: 23.0 ap360007 Affected: 23.0 ap369295 Affected: 23.0 ap366358 Affected: 23.0 ap366677 Affected: 23.0 ap366803 Affected: 23.0 ap363128 Affected: 23.0 ap369529 Affected: 23.0 ap368445 Affected: 23.0 ap369227 Affected: 23.0 ap367332 Affected: 23.0 ap369881 Affected: 23.0 ap367874 Affected: 23.0 ap367974 Affected: 23.0 ap367998 Affected: 23.0 ap372337 Affected: 23.0 ap372706 Affected: 23.0 ap370193 Affected: 23.0 ap372389 Affected: 23.0 ap372708 Affected: 23.0 ap370911 Affected: 23.0 ap371681 Affected: 23.0 ap370952 Affected: 23.0 ap371436 Affected: 23.0 ap371155 Affected: 23.0 ap371682 Affected: 23.0 ap371775 Affected: 23.0 ap375449 Affected: 23.0 ap375720 Affected: 23.0 ap375661 Affected: 23.0 ap375097 Affected: 23.0 ap373562 Affected: 23.0 ap373015 Affected: 23.0 ap374971 Affected: 23.0 ap373034 Affected: 23.0 ap374324 Affected: 23.0 ap373899 Affected: 23.0 ap376041 Affected: 23.0 ap375003 Affected: 23.0 ap373539 Affected: 23.0 ap376179 Affected: 23.0 ap373299 Affected: 23.0 ap375908 Affected: 23.0 ap373391 Affected: 23.0 ap376252 Affected: 23.0 ap376429 Affected: 23.0 ap376410 Affected: 23.0 ap376426 Affected: 23.0 ap376485 Affected: 23.0 ap376620 Affected: 23.0 ap378025 Affected: 23.0 ap376671 Affected: 23.0 ap376614 Affected: 23.0 ap377578 Affected: 23.0 ap377516 Affected: 23.0 ap377515 Affected: 23.0 ap377494 Affected: 23.0 ap377984 Affected: 23.0 ap378863 Affected: 23.0 ap378882 Affected: 23.0 ap378218 Affected: 23.0 ap380161 Affected: 23.0 ap378257 Affected: 23.0 ap379888 Affected: 23.0 ap379326 Affected: 23.0 ap377149 Affected: 23.0 ap380446 Affected: 23.0 ap380180 Affected: 23.0 ap376935 Affected: 23.0 ap380473 Affected: 23.0 ap381091 Affected: 23.0 ap380783 Affected: 23.0 ap380537 Affected: 23.0 ap380512 Affected: 23.0 ap381072 Affected: 23.0 ap381584 Affected: 23.0 ap381088 Affected: 23.0 ap382053 Affected: 23.0 ap382253 Affected: 23.0 ap382709 Affected: 23.0 ap382717 Affected: 23.0 ap381498 Affected: 23.0 ap382992 Affected: 23.0 ap383594 Affected: 23.0 ap383168 Affected: 23.0 ap382362 Affected: 23.0 ap384431 Affected: 23.0 ap384428 Affected: 22.0 Affected: 22.0 ap375345 Affected: 22.0 ap382358 Affected: 22.0 ap347741 Affected: 22.0 ap377577 Affected: 22.0 ap372243 Affected: 22.0 ap372504 Affected: 22.0 ap360116 Affected: 22.0 ap368125 Affected: 22.0 ap367732 Affected: 22.0 ap357506 Affected: 22.0 ap380486 Affected: 22.0 ap379780 Affected: 22.0 ap351263 Affected: 22.0 ap366916 Affected: 22.0 ap363363 Affected: 22.0 ap374507 Affected: 22.0 ap372845 Affected: 22.0 ap373684 Affected: 22.0 ap366898 Affected: 22.0 ap368180 Affected: 22.0 ap366882 Affected: 22.0 ap369774 Affected: 22.0 ap374269 Affected: 22.0 ap365223 Affected: 22.0 ap359972 Affected: 22.0 ap359433 Affected: 22.0 ap359991 Affected: 22.0 ap358357 Affected: 22.0 ap360244 Affected: 22.0 ap369931 Affected: 22.0 ap367874 Affected: 22.0 ap376710 Affected: 22.0 ap342836 Affected: 22.0 ap346307 Affected: 22.0 ap345032 Affected: 22.0 ap354070 Affected: 22.0 ap354069 Affected: 22.0 ap353915 Affected: 22.0 ap349201 Affected: 22.0 ap350217 Affected: 22.0 ap350179 Affected: 22.0 ap354313 Affected: 22.0 ap354098 Affected: 22.0 ap353975 Affected: 22.0 ap348945 Affected: 22.0 ap354090 Affected: 22.0 ap350573 Affected: 22.0 ap352516 Affected: 22.0 ap352109 Affected: 22.0 ap353384 Affected: 22.0 ap353490 Affected: 22.0 ap352962 Affected: 22.0 ap352703 Affected: 22.0 ap353418 Affected: 22.0 ap351700 Affected: 22.0 ap352205 Affected: 22.0 ap353360 Affected: 22.0 ap352932 Affected: 22.0 ap354921 Affected: 22.0 ap352726 Affected: 22.0 ap355757 Affected: 22.0 ap352972 Affected: 22.0 ap353577 Affected: 22.0 ap356603 Affected: 22.0 ap355894 Affected: 22.0 ap355385 Affected: 22.0 ap353311 Affected: 22.0 ap355300 Affected: 22.0 ap355083 Affected: 22.0 ap357047 Affected: 22.0 ap353681 Affected: 22.0 ap356848 Affected: 22.0 ap356706 Affected: 22.0 ap356474 Affected: 22.0 ap355091 Affected: 22.0 ap354785 Affected: 22.0 ap355905 Affected: 22.0 ap355365 Affected: 22.0 ap356359 Affected: 22.0 ap356434 Affected: 22.0 ap354936 Affected: 22.0 ap355285 Affected: 22.0 ap355674 Affected: 22.0 ap355922 Affected: 22.0 ap354597 Affected: 22.0 ap356458 Affected: 22.0 ap356140 Affected: 22.0 ap354413 Affected: 22.0 ap357400 Affected: 22.0 ap357632 Affected: 22.0 ap356390 Affected: 22.0 ap357607 Affected: 22.0 ap357447 Affected: 22.0 ap357560 Affected: 22.0 ap357645 Affected: 22.0 ap357768 Affected: 22.0 ap357859 Affected: 22.0 ap357769 Affected: 22.0 ap358469 Affected: 22.0 ap359049 Affected: 22.0 ap358971 Affected: 22.0 ap358246 Affected: 22.0 ap358234 Affected: 22.0 ap359156 Affected: 22.0 ap359549 Affected: 22.0 ap358454 Affected: 22.0 ap358563 Affected: 22.0 ap360250 Affected: 22.0 ap360564 Affected: 22.0 ap358887 Affected: 22.0 ap359470 Affected: 22.0 ap359465 Affected: 22.0 ap359748 Affected: 22.0 ap360817 Affected: 22.0 ap360201 Affected: 22.0 ap361153 Affected: 22.0 ap360904 Affected: 22.0 ap359644 Affected: 22.0 ap359765 Affected: 22.0 ap360912 Affected: 22.0 ap360184 Affected: 22.0 ap361520 Affected: 22.0 ap362771 Affected: 22.0 ap361445 Affected: 22.0 ap361560 Affected: 22.0 ap362848 Affected: 22.0 ap361559 Affected: 22.0 ap361820 Affected: 22.0 ap361533 Affected: 22.0 ap362163 Affected: 22.0 ap362001 Affected: 22.0 ap362276 Affected: 22.0 ap362490 Affected: 22.0 ap361154 Affected: 22.0 ap362799 Affected: 22.0 ap363815 Affected: 22.0 ap362328 Affected: 22.0 ap363332 Affected: 22.0 ap368026 Affected: 22.0 ap363521 Affected: 22.0 ap364199 Affected: 22.0 ap363568 Affected: 22.0 ap363759 Affected: 22.0 ap363596 Affected: 22.0 ap366701 Affected: 22.0 ap366174 Affected: 22.0 ap363729 Affected: 22.0 ap363770 Affected: 22.0 ap366358 Affected: 22.0 ap366744 Affected: 22.0 ap366180 Affected: 22.0 ap366649 Affected: 22.0 ap365172 Affected: 22.0 ap365115 Affected: 22.0 ap366656 Affected: 22.0 ap364521 Affected: 22.0 ap364844 Affected: 22.0 ap364781 Affected: 22.0 ap365146 Affected: 22.0 ap364797 Affected: 22.0 ap364932 Affected: 22.0 ap365545 Affected: 22.0 ap365800 Affected: 22.0 ap365173 Affected: 22.0 ap364473 Affected: 22.0 ap365400 Affected: 22.0 ap367396 Affected: 22.0 ap365632 Affected: 22.0 ap365905 Affected: 22.0 ap367109 Affected: 22.0 ap365449 Affected: 22.0 ap365685 Affected: 22.0 ap367434 Affected: 22.0 ap365597 Affected: 22.0 ap365801 Affected: 22.0 ap365730 Affected: 22.0 ap365758 Affected: 22.0 ap365920 Affected: 22.0 ap371313 Affected: 22.0 ap367291 Affected: 22.0 ap365727 Affected: 22.0 ap367524 Affected: 22.0 ap371587 Affected: 22.0 ap367453 Affected: 22.0 ap365601 Affected: 22.0 ap365779 Affected: 22.0 ap371871 Affected: 22.0 ap371437 Affected: 22.0 ap372043 Affected: 22.0 ap372016 Affected: 22.0 ap367367 Affected: 22.0 ap372072 Affected: 22.0 ap372177 Affected: 22.0 ap371681 Affected: 22.0 ap372354 Affected: 22.0 ap371656 Affected: 22.0 ap371033 Affected: 22.0 ap371583 Affected: 22.0 ap371911 Affected: 22.0 ap371467 Affected: 22.0 ap372371 Affected: 22.0 ap368695 Affected: 22.0 ap368913 Affected: 22.0 ap368987 Affected: 22.0 ap372024 Affected: 22.0 ap372152 Affected: 22.0 ap371961 Affected: 22.0 ap369674 Affected: 22.0 ap369173 Affected: 22.0 ap369863 Affected: 22.0 ap369641 Affected: 22.0 ap368604 Affected: 22.0 ap368087 Affected: 22.0 ap368216 Affected: 22.0 ap369934 Affected: 22.0 ap368326 Affected: 22.0 ap369219 Affected: 22.0 ap369227 Affected: 22.0 ap368422 Affected: 22.0 ap369881 Affected: 22.0 ap369550 Affected: 22.0 ap369668 Affected: 22.0 ap369571 Affected: 22.0 ap372433 Affected: 22.0 ap370654 Affected: 22.0 ap370138 Affected: 22.0 ap370615 Affected: 22.0 ap372643 Affected: 22.0 ap372708 Affected: 22.0 ap370590 Affected: 22.0 ap372390 Affected: 22.0 ap372757 Affected: 22.0 ap370636 Affected: 22.0 ap372750 Affected: 22.0 ap372706 Affected: 22.0 ap370269 Affected: 22.0 ap370180 Affected: 22.0 ap370675 Affected: 22.0 ap370737 Affected: 22.0 ap370424 Affected: 22.0 ap370544 Affected: 22.0 ap374339 Affected: 22.0 ap370459 Affected: 22.0 ap370545 Affected: 22.0 ap370389 Affected: 22.0 ap374803 Affected: 22.0 ap370358 Affected: 22.0 ap373539 Affected: 22.0 ap373118 Affected: 22.0 ap373855 Affected: 22.0 ap373820 Affected: 22.0 ap373438 Affected: 22.0 ap374660 Affected: 22.0 ap373018 Affected: 22.0 ap373954 Affected: 22.0 ap374230 Affected: 22.0 ap374330 Affected: 22.0 ap374460 Affected: 22.0 ap372956 Affected: 22.0 ap373111 Affected: 22.0 ap374114 Affected: 22.0 ap373122 Affected: 22.0 ap373108 Affected: 22.0 ap374356 Affected: 22.0 ap375069 Affected: 22.0 ap373899 Affected: 22.0 ap374971 Affected: 22.0 ap375862 Affected: 22.0 ap375354 Affected: 22.0 ap375688 Affected: 22.0 ap373046 Affected: 22.0 ap373452 Affected: 22.0 ap374334 Affected: 22.0 ap374428 Affected: 22.0 ap374596 Affected: 22.0 ap372963 Affected: 22.0 ap376041 Affected: 22.0 ap376410 Affected: 22.0 ap376298 Affected: 22.0 ap372799 Affected: 22.0 ap376181 Affected: 22.0 ap375090 Affected: 22.0 ap376416 Affected: 22.0 ap373098 Affected: 22.0 ap375937 Affected: 22.0 ap376531 Affected: 22.0 ap375465 Affected: 22.0 ap376100 Affected: 22.0 ap375634 Affected: 22.0 ap375091 Affected: 22.0 ap375018 Affected: 22.0 ap375743 Affected: 22.0 ap375383 Affected: 22.0 ap375719 Affected: 22.0 ap376614 Affected: 22.0 ap376541 Affected: 22.0 ap375685 Affected: 22.0 ap374895 Affected: 22.0 ap376429 Affected: 22.0 ap379838 Affected: 22.0 ap380187 Affected: 22.0 ap380143 Affected: 22.0 ap379972 Affected: 22.0 ap380535 Affected: 22.0 ap380117 Affected: 22.0 ap380473 Affected: 22.0 ap375924 Affected: 22.0 ap379833 Affected: 22.0 ap376661 Affected: 22.0 ap380041 Affected: 22.0 ap380391 Affected: 22.0 ap379795 Affected: 22.0 ap376701 Affected: 22.0 ap376668 Affected: 22.0 ap377384 Affected: 22.0 ap377480 Affected: 22.0 ap377581 Affected: 22.0 ap376652 Affected: 22.0 ap376620 Affected: 22.0 ap378405 Affected: 22.0 ap377494 Affected: 22.0 ap378440 Affected: 22.0 ap378581 Affected: 22.0 ap377307 Affected: 22.0 ap377566 Affected: 22.0 ap378585 Affected: 22.0 ap377149 Affected: 22.0 ap378471 Affected: 22.0 ap377412 Affected: 22.0 ap377068 Affected: 22.0 ap377757 Affected: 22.0 ap378332 Affected: 22.0 ap379016 Affected: 22.0 ap378866 Affected: 22.0 ap378079 Affected: 22.0 ap378509 Affected: 22.0 ap378953 Affected: 22.0 ap377779 Affected: 22.0 ap379008 Affected: 22.0 ap379694 Affected: 22.0 ap379597 Affected: 22.0 ap378882 Affected: 22.0 ap379389 Affected: 22.0 ap379487 Affected: 22.0 ap379374 Affected: 22.0 ap380771 Affected: 22.0 ap381594 Affected: 22.0 ap381243 Affected: 22.0 ap380629 Affected: 22.0 ap380751 Affected: 22.0 ap382158 Affected: 22.0 ap378999 Affected: 22.0 ap381136 Affected: 22.0 ap382240 Affected: 22.0 ap382362 Affected: 22.0 ap382192 Affected: 22.0 ap381091 Affected: 22.0 ap382251 Affected: 22.0 ap381732 Affected: 22.0 ap381584 Affected: 22.0 ap381118 Affected: 22.0 ap382717 Affected: 22.0 ap383569 Affected: 22.0 ap382487 Affected: 22.0 ap383002 Affected: 22.0 ap382434 Affected: 22.0 ap383170 Affected: 22.0 ap383309 Affected: 22.0 ap383514 Affected: 22.0 ap383710 Affected: 22.0 ap382977 Affected: 22.0 ap382488 Affected: 22.0 ap383134 Affected: 22.0 ap359429 Affected: 21.sp1 ap351795 Affected: 21.sp1 ap348143 Affected: 21.sp1 ap351216 Affected: 21.sp1 ap339376 Affected: 21.sp1 ap358132 Affected: 21.sp1 ap355717 Affected: 21.sp1 ap346074 Affected: 21.sp1 ap373102 Affected: 21.sp1 ap235252 Affected: 21.sp1 ap242300 Affected: 21.sp1 ap338964 Affected: 21.sp1 ap339196 Affected: 21.sp1 ap341645 Affected: 21.sp1 ap341897 Affected: 21.sp1 ap342461 Affected: 21.sp1 ap342625 Affected: 21.sp1 ap342755 Affected: 21.sp1 ap342853 Affected: 21.sp1 ap343352 Affected: 21.sp1 ap344270 Affected: 21.sp1 ap344479 Affected: 21.sp1 ap344681 Affected: 21.sp1 ap345054 Affected: 21.sp1 ap345293 Affected: 21.sp1 ap345755 Affected: 21.sp1 ap348472 Affected: 21.sp1 ap349222 Affected: 21.sp1 ap350050 Affected: 21.sp1 ap350189 Affected: 21.sp1 ap351248 Affected: 21.sp1 ap351295 Affected: 21.sp1 ap351530 Affected: 21.sp1 ap351754 Affected: 21.sp1 ap351898 Affected: 21.sp1 ap352082 Affected: 21.sp1 ap352205 Affected: 21.sp1 ap352972 Affected: 21.sp1 ap353418 Affected: 21.sp1 ap353841 Affected: 21.sp1 ap354707 Affected: 21.sp1 ap356271 Affected: 21.sp1 ap356787 Affected: 21.sp1 ap357574 Affected: 21.sp1 ap358730 Affected: 21.sp1 ap360211 Affected: 21.sp1 ap360306 Affected: 21.sp1 ap361420 Affected: 21.sp1 ap365379 Affected: 21.sp1 ap365390 Affected: 21.sp1 ap366348 Affected: 21.sp1 ap374822 Affected: 21.sp1 ap375026 Affected: 21.sp1 ap375053 Affected: 21.0 ap349066 Affected: 21.0 ap364358 Affected: 21.0 ap362637 Affected: 21.0 ap342145 Affected: 21.0 ap357571 Affected: 21.0 ap362825 Affected: 21.0 ap361559 Affected: 21.0 ap339395 Affected: 21.0 ap348945 Affected: 21.0 ap346902 Affected: 21.0 ap350308 Affected: 21.0 ap363301 Affected: 21.0 ap349850 Affected: 21.0 ap344752 Affected: 21.0 ap347640 Affected: 21.0 ap350111 Affected: 21.0 ap355616 Affected: 21.0 ap353841 Affected: 21.0 ap346128 Affected: 21.0 ap350204 Affected: 21.0 ap341897 Affected: 21.0 ap347064 Affected: 21.0 ap350032 Affected: 21.0 ap351261 Affected: 21.0 ap352182 Affected: 21.0 ap350760 Affected: 21.0 ap363408 Affected: 21.sp1 ap340545 Affected: 21.sp1 ap341683 Affected: 21.sp1 ap341909 Affected: 21.sp1 ap342214 Affected: 21.sp1 ap344301 Affected: 21.sp1 ap344783 Affected: 21.sp1 ap346270 Affected: 21.sp1 ap346351 Affected: 21.sp1 ap347928 Affected: 21.sp1 ap349517 Affected: 21.sp1 ap349090 Affected: 21.sp1 ap351315 Affected: 21.sp1 ap352304 Affected: 21.sp1 ap351738 Affected: 21.sp1 ap354194 Affected: 21.sp1 ap357347 Affected: 21.sp1 ap364778 Affected: 21.sp1 ap372422 Affected: 21.sp1 ap371281 Affected: 21.sp1 ap370908 Affected: 21.sp1 ap379493 Affected: 21.sp1 ap380506 Affected: 21.sp9 ap360116 Affected: 21.sp9 ap367207 Affected: RI.2021.02 Affected: RI.2021.08 Affected: RI.2021.09 Affected: RI.2021.10 Affected: RI.2021.11 Affected: RI.2021.12 Affected: RI.2022.02 Affected: RI.2022.03 Affected: RI.2022.04 Affected: RI.2022.07 Affected: RI.2022.06 Affected: RI.2022.05 Affected: RI.2022.08 Affected: RI.2022.09 Affected: RI.2022.10 Affected: RI.2022.12 Affected: RI.2023.01 Affected: RI.2023.03 Affected: RI.2023.02 Affected: RI.2023.04 Affected: RI.2023.05 Affected: RI.2023.07 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:36.796Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-bw-auth-bypass-kCggMWhX",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-20238",
"options": [
{
"Exploitation": "None"
},
{
"Automatable": "Yes"
},
{
"Technical Impact": "Total"
}
],
"role": "CISA Coordinator",
"timestamp": "2023-11-15T16:38:47.577160Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-23T19:41:58.912Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco BroadWorks",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "23.0"
},
{
"status": "affected",
"version": "23.0 ap383785"
},
{
"status": "affected",
"version": "23.0 ap382487"
},
{
"status": "affected",
"version": "23.0 ap381781"
},
{
"status": "affected",
"version": "23.0 ap360007"
},
{
"status": "affected",
"version": "23.0 ap369295"
},
{
"status": "affected",
"version": "23.0 ap366358"
},
{
"status": "affected",
"version": "23.0 ap366677"
},
{
"status": "affected",
"version": "23.0 ap366803"
},
{
"status": "affected",
"version": "23.0 ap363128"
},
{
"status": "affected",
"version": "23.0 ap369529"
},
{
"status": "affected",
"version": "23.0 ap368445"
},
{
"status": "affected",
"version": "23.0 ap369227"
},
{
"status": "affected",
"version": "23.0 ap367332"
},
{
"status": "affected",
"version": "23.0 ap369881"
},
{
"status": "affected",
"version": "23.0 ap367874"
},
{
"status": "affected",
"version": "23.0 ap367974"
},
{
"status": "affected",
"version": "23.0 ap367998"
},
{
"status": "affected",
"version": "23.0 ap372337"
},
{
"status": "affected",
"version": "23.0 ap372706"
},
{
"status": "affected",
"version": "23.0 ap370193"
},
{
"status": "affected",
"version": "23.0 ap372389"
},
{
"status": "affected",
"version": "23.0 ap372708"
},
{
"status": "affected",
"version": "23.0 ap370911"
},
{
"status": "affected",
"version": "23.0 ap371681"
},
{
"status": "affected",
"version": "23.0 ap370952"
},
{
"status": "affected",
"version": "23.0 ap371436"
},
{
"status": "affected",
"version": "23.0 ap371155"
},
{
"status": "affected",
"version": "23.0 ap371682"
},
{
"status": "affected",
"version": "23.0 ap371775"
},
{
"status": "affected",
"version": "23.0 ap375449"
},
{
"status": "affected",
"version": "23.0 ap375720"
},
{
"status": "affected",
"version": "23.0 ap375661"
},
{
"status": "affected",
"version": "23.0 ap375097"
},
{
"status": "affected",
"version": "23.0 ap373562"
},
{
"status": "affected",
"version": "23.0 ap373015"
},
{
"status": "affected",
"version": "23.0 ap374971"
},
{
"status": "affected",
"version": "23.0 ap373034"
},
{
"status": "affected",
"version": "23.0 ap374324"
},
{
"status": "affected",
"version": "23.0 ap373899"
},
{
"status": "affected",
"version": "23.0 ap376041"
},
{
"status": "affected",
"version": "23.0 ap375003"
},
{
"status": "affected",
"version": "23.0 ap373539"
},
{
"status": "affected",
"version": "23.0 ap376179"
},
{
"status": "affected",
"version": "23.0 ap373299"
},
{
"status": "affected",
"version": "23.0 ap375908"
},
{
"status": "affected",
"version": "23.0 ap373391"
},
{
"status": "affected",
"version": "23.0 ap376252"
},
{
"status": "affected",
"version": "23.0 ap376429"
},
{
"status": "affected",
"version": "23.0 ap376410"
},
{
"status": "affected",
"version": "23.0 ap376426"
},
{
"status": "affected",
"version": "23.0 ap376485"
},
{
"status": "affected",
"version": "23.0 ap376620"
},
{
"status": "affected",
"version": "23.0 ap378025"
},
{
"status": "affected",
"version": "23.0 ap376671"
},
{
"status": "affected",
"version": "23.0 ap376614"
},
{
"status": "affected",
"version": "23.0 ap377578"
},
{
"status": "affected",
"version": "23.0 ap377516"
},
{
"status": "affected",
"version": "23.0 ap377515"
},
{
"status": "affected",
"version": "23.0 ap377494"
},
{
"status": "affected",
"version": "23.0 ap377984"
},
{
"status": "affected",
"version": "23.0 ap378863"
},
{
"status": "affected",
"version": "23.0 ap378882"
},
{
"status": "affected",
"version": "23.0 ap378218"
},
{
"status": "affected",
"version": "23.0 ap380161"
},
{
"status": "affected",
"version": "23.0 ap378257"
},
{
"status": "affected",
"version": "23.0 ap379888"
},
{
"status": "affected",
"version": "23.0 ap379326"
},
{
"status": "affected",
"version": "23.0 ap377149"
},
{
"status": "affected",
"version": "23.0 ap380446"
},
{
"status": "affected",
"version": "23.0 ap380180"
},
{
"status": "affected",
"version": "23.0 ap376935"
},
{
"status": "affected",
"version": "23.0 ap380473"
},
{
"status": "affected",
"version": "23.0 ap381091"
},
{
"status": "affected",
"version": "23.0 ap380783"
},
{
"status": "affected",
"version": "23.0 ap380537"
},
{
"status": "affected",
"version": "23.0 ap380512"
},
{
"status": "affected",
"version": "23.0 ap381072"
},
{
"status": "affected",
"version": "23.0 ap381584"
},
{
"status": "affected",
"version": "23.0 ap381088"
},
{
"status": "affected",
"version": "23.0 ap382053"
},
{
"status": "affected",
"version": "23.0 ap382253"
},
{
"status": "affected",
"version": "23.0 ap382709"
},
{
"status": "affected",
"version": "23.0 ap382717"
},
{
"status": "affected",
"version": "23.0 ap381498"
},
{
"status": "affected",
"version": "23.0 ap382992"
},
{
"status": "affected",
"version": "23.0 ap383594"
},
{
"status": "affected",
"version": "23.0 ap383168"
},
{
"status": "affected",
"version": "23.0 ap382362"
},
{
"status": "affected",
"version": "23.0 ap384431"
},
{
"status": "affected",
"version": "23.0 ap384428"
},
{
"status": "affected",
"version": "22.0"
},
{
"status": "affected",
"version": "22.0 ap375345"
},
{
"status": "affected",
"version": "22.0 ap382358"
},
{
"status": "affected",
"version": "22.0 ap347741"
},
{
"status": "affected",
"version": "22.0 ap377577"
},
{
"status": "affected",
"version": "22.0 ap372243"
},
{
"status": "affected",
"version": "22.0 ap372504"
},
{
"status": "affected",
"version": "22.0 ap360116"
},
{
"status": "affected",
"version": "22.0 ap368125"
},
{
"status": "affected",
"version": "22.0 ap367732"
},
{
"status": "affected",
"version": "22.0 ap357506"
},
{
"status": "affected",
"version": "22.0 ap380486"
},
{
"status": "affected",
"version": "22.0 ap379780"
},
{
"status": "affected",
"version": "22.0 ap351263"
},
{
"status": "affected",
"version": "22.0 ap366916"
},
{
"status": "affected",
"version": "22.0 ap363363"
},
{
"status": "affected",
"version": "22.0 ap374507"
},
{
"status": "affected",
"version": "22.0 ap372845"
},
{
"status": "affected",
"version": "22.0 ap373684"
},
{
"status": "affected",
"version": "22.0 ap366898"
},
{
"status": "affected",
"version": "22.0 ap368180"
},
{
"status": "affected",
"version": "22.0 ap366882"
},
{
"status": "affected",
"version": "22.0 ap369774"
},
{
"status": "affected",
"version": "22.0 ap374269"
},
{
"status": "affected",
"version": "22.0 ap365223"
},
{
"status": "affected",
"version": "22.0 ap359972"
},
{
"status": "affected",
"version": "22.0 ap359433"
},
{
"status": "affected",
"version": "22.0 ap359991"
},
{
"status": "affected",
"version": "22.0 ap358357"
},
{
"status": "affected",
"version": "22.0 ap360244"
},
{
"status": "affected",
"version": "22.0 ap369931"
},
{
"status": "affected",
"version": "22.0 ap367874"
},
{
"status": "affected",
"version": "22.0 ap376710"
},
{
"status": "affected",
"version": "22.0 ap342836"
},
{
"status": "affected",
"version": "22.0 ap346307"
},
{
"status": "affected",
"version": "22.0 ap345032"
},
{
"status": "affected",
"version": "22.0 ap354070"
},
{
"status": "affected",
"version": "22.0 ap354069"
},
{
"status": "affected",
"version": "22.0 ap353915"
},
{
"status": "affected",
"version": "22.0 ap349201"
},
{
"status": "affected",
"version": "22.0 ap350217"
},
{
"status": "affected",
"version": "22.0 ap350179"
},
{
"status": "affected",
"version": "22.0 ap354313"
},
{
"status": "affected",
"version": "22.0 ap354098"
},
{
"status": "affected",
"version": "22.0 ap353975"
},
{
"status": "affected",
"version": "22.0 ap348945"
},
{
"status": "affected",
"version": "22.0 ap354090"
},
{
"status": "affected",
"version": "22.0 ap350573"
},
{
"status": "affected",
"version": "22.0 ap352516"
},
{
"status": "affected",
"version": "22.0 ap352109"
},
{
"status": "affected",
"version": "22.0 ap353384"
},
{
"status": "affected",
"version": "22.0 ap353490"
},
{
"status": "affected",
"version": "22.0 ap352962"
},
{
"status": "affected",
"version": "22.0 ap352703"
},
{
"status": "affected",
"version": "22.0 ap353418"
},
{
"status": "affected",
"version": "22.0 ap351700"
},
{
"status": "affected",
"version": "22.0 ap352205"
},
{
"status": "affected",
"version": "22.0 ap353360"
},
{
"status": "affected",
"version": "22.0 ap352932"
},
{
"status": "affected",
"version": "22.0 ap354921"
},
{
"status": "affected",
"version": "22.0 ap352726"
},
{
"status": "affected",
"version": "22.0 ap355757"
},
{
"status": "affected",
"version": "22.0 ap352972"
},
{
"status": "affected",
"version": "22.0 ap353577"
},
{
"status": "affected",
"version": "22.0 ap356603"
},
{
"status": "affected",
"version": "22.0 ap355894"
},
{
"status": "affected",
"version": "22.0 ap355385"
},
{
"status": "affected",
"version": "22.0 ap353311"
},
{
"status": "affected",
"version": "22.0 ap355300"
},
{
"status": "affected",
"version": "22.0 ap355083"
},
{
"status": "affected",
"version": "22.0 ap357047"
},
{
"status": "affected",
"version": "22.0 ap353681"
},
{
"status": "affected",
"version": "22.0 ap356848"
},
{
"status": "affected",
"version": "22.0 ap356706"
},
{
"status": "affected",
"version": "22.0 ap356474"
},
{
"status": "affected",
"version": "22.0 ap355091"
},
{
"status": "affected",
"version": "22.0 ap354785"
},
{
"status": "affected",
"version": "22.0 ap355905"
},
{
"status": "affected",
"version": "22.0 ap355365"
},
{
"status": "affected",
"version": "22.0 ap356359"
},
{
"status": "affected",
"version": "22.0 ap356434"
},
{
"status": "affected",
"version": "22.0 ap354936"
},
{
"status": "affected",
"version": "22.0 ap355285"
},
{
"status": "affected",
"version": "22.0 ap355674"
},
{
"status": "affected",
"version": "22.0 ap355922"
},
{
"status": "affected",
"version": "22.0 ap354597"
},
{
"status": "affected",
"version": "22.0 ap356458"
},
{
"status": "affected",
"version": "22.0 ap356140"
},
{
"status": "affected",
"version": "22.0 ap354413"
},
{
"status": "affected",
"version": "22.0 ap357400"
},
{
"status": "affected",
"version": "22.0 ap357632"
},
{
"status": "affected",
"version": "22.0 ap356390"
},
{
"status": "affected",
"version": "22.0 ap357607"
},
{
"status": "affected",
"version": "22.0 ap357447"
},
{
"status": "affected",
"version": "22.0 ap357560"
},
{
"status": "affected",
"version": "22.0 ap357645"
},
{
"status": "affected",
"version": "22.0 ap357768"
},
{
"status": "affected",
"version": "22.0 ap357859"
},
{
"status": "affected",
"version": "22.0 ap357769"
},
{
"status": "affected",
"version": "22.0 ap358469"
},
{
"status": "affected",
"version": "22.0 ap359049"
},
{
"status": "affected",
"version": "22.0 ap358971"
},
{
"status": "affected",
"version": "22.0 ap358246"
},
{
"status": "affected",
"version": "22.0 ap358234"
},
{
"status": "affected",
"version": "22.0 ap359156"
},
{
"status": "affected",
"version": "22.0 ap359549"
},
{
"status": "affected",
"version": "22.0 ap358454"
},
{
"status": "affected",
"version": "22.0 ap358563"
},
{
"status": "affected",
"version": "22.0 ap360250"
},
{
"status": "affected",
"version": "22.0 ap360564"
},
{
"status": "affected",
"version": "22.0 ap358887"
},
{
"status": "affected",
"version": "22.0 ap359470"
},
{
"status": "affected",
"version": "22.0 ap359465"
},
{
"status": "affected",
"version": "22.0 ap359748"
},
{
"status": "affected",
"version": "22.0 ap360817"
},
{
"status": "affected",
"version": "22.0 ap360201"
},
{
"status": "affected",
"version": "22.0 ap361153"
},
{
"status": "affected",
"version": "22.0 ap360904"
},
{
"status": "affected",
"version": "22.0 ap359644"
},
{
"status": "affected",
"version": "22.0 ap359765"
},
{
"status": "affected",
"version": "22.0 ap360912"
},
{
"status": "affected",
"version": "22.0 ap360184"
},
{
"status": "affected",
"version": "22.0 ap361520"
},
{
"status": "affected",
"version": "22.0 ap362771"
},
{
"status": "affected",
"version": "22.0 ap361445"
},
{
"status": "affected",
"version": "22.0 ap361560"
},
{
"status": "affected",
"version": "22.0 ap362848"
},
{
"status": "affected",
"version": "22.0 ap361559"
},
{
"status": "affected",
"version": "22.0 ap361820"
},
{
"status": "affected",
"version": "22.0 ap361533"
},
{
"status": "affected",
"version": "22.0 ap362163"
},
{
"status": "affected",
"version": "22.0 ap362001"
},
{
"status": "affected",
"version": "22.0 ap362276"
},
{
"status": "affected",
"version": "22.0 ap362490"
},
{
"status": "affected",
"version": "22.0 ap361154"
},
{
"status": "affected",
"version": "22.0 ap362799"
},
{
"status": "affected",
"version": "22.0 ap363815"
},
{
"status": "affected",
"version": "22.0 ap362328"
},
{
"status": "affected",
"version": "22.0 ap363332"
},
{
"status": "affected",
"version": "22.0 ap368026"
},
{
"status": "affected",
"version": "22.0 ap363521"
},
{
"status": "affected",
"version": "22.0 ap364199"
},
{
"status": "affected",
"version": "22.0 ap363568"
},
{
"status": "affected",
"version": "22.0 ap363759"
},
{
"status": "affected",
"version": "22.0 ap363596"
},
{
"status": "affected",
"version": "22.0 ap366701"
},
{
"status": "affected",
"version": "22.0 ap366174"
},
{
"status": "affected",
"version": "22.0 ap363729"
},
{
"status": "affected",
"version": "22.0 ap363770"
},
{
"status": "affected",
"version": "22.0 ap366358"
},
{
"status": "affected",
"version": "22.0 ap366744"
},
{
"status": "affected",
"version": "22.0 ap366180"
},
{
"status": "affected",
"version": "22.0 ap366649"
},
{
"status": "affected",
"version": "22.0 ap365172"
},
{
"status": "affected",
"version": "22.0 ap365115"
},
{
"status": "affected",
"version": "22.0 ap366656"
},
{
"status": "affected",
"version": "22.0 ap364521"
},
{
"status": "affected",
"version": "22.0 ap364844"
},
{
"status": "affected",
"version": "22.0 ap364781"
},
{
"status": "affected",
"version": "22.0 ap365146"
},
{
"status": "affected",
"version": "22.0 ap364797"
},
{
"status": "affected",
"version": "22.0 ap364932"
},
{
"status": "affected",
"version": "22.0 ap365545"
},
{
"status": "affected",
"version": "22.0 ap365800"
},
{
"status": "affected",
"version": "22.0 ap365173"
},
{
"status": "affected",
"version": "22.0 ap364473"
},
{
"status": "affected",
"version": "22.0 ap365400"
},
{
"status": "affected",
"version": "22.0 ap367396"
},
{
"status": "affected",
"version": "22.0 ap365632"
},
{
"status": "affected",
"version": "22.0 ap365905"
},
{
"status": "affected",
"version": "22.0 ap367109"
},
{
"status": "affected",
"version": "22.0 ap365449"
},
{
"status": "affected",
"version": "22.0 ap365685"
},
{
"status": "affected",
"version": "22.0 ap367434"
},
{
"status": "affected",
"version": "22.0 ap365597"
},
{
"status": "affected",
"version": "22.0 ap365801"
},
{
"status": "affected",
"version": "22.0 ap365730"
},
{
"status": "affected",
"version": "22.0 ap365758"
},
{
"status": "affected",
"version": "22.0 ap365920"
},
{
"status": "affected",
"version": "22.0 ap371313"
},
{
"status": "affected",
"version": "22.0 ap367291"
},
{
"status": "affected",
"version": "22.0 ap365727"
},
{
"status": "affected",
"version": "22.0 ap367524"
},
{
"status": "affected",
"version": "22.0 ap371587"
},
{
"status": "affected",
"version": "22.0 ap367453"
},
{
"status": "affected",
"version": "22.0 ap365601"
},
{
"status": "affected",
"version": "22.0 ap365779"
},
{
"status": "affected",
"version": "22.0 ap371871"
},
{
"status": "affected",
"version": "22.0 ap371437"
},
{
"status": "affected",
"version": "22.0 ap372043"
},
{
"status": "affected",
"version": "22.0 ap372016"
},
{
"status": "affected",
"version": "22.0 ap367367"
},
{
"status": "affected",
"version": "22.0 ap372072"
},
{
"status": "affected",
"version": "22.0 ap372177"
},
{
"status": "affected",
"version": "22.0 ap371681"
},
{
"status": "affected",
"version": "22.0 ap372354"
},
{
"status": "affected",
"version": "22.0 ap371656"
},
{
"status": "affected",
"version": "22.0 ap371033"
},
{
"status": "affected",
"version": "22.0 ap371583"
},
{
"status": "affected",
"version": "22.0 ap371911"
},
{
"status": "affected",
"version": "22.0 ap371467"
},
{
"status": "affected",
"version": "22.0 ap372371"
},
{
"status": "affected",
"version": "22.0 ap368695"
},
{
"status": "affected",
"version": "22.0 ap368913"
},
{
"status": "affected",
"version": "22.0 ap368987"
},
{
"status": "affected",
"version": "22.0 ap372024"
},
{
"status": "affected",
"version": "22.0 ap372152"
},
{
"status": "affected",
"version": "22.0 ap371961"
},
{
"status": "affected",
"version": "22.0 ap369674"
},
{
"status": "affected",
"version": "22.0 ap369173"
},
{
"status": "affected",
"version": "22.0 ap369863"
},
{
"status": "affected",
"version": "22.0 ap369641"
},
{
"status": "affected",
"version": "22.0 ap368604"
},
{
"status": "affected",
"version": "22.0 ap368087"
},
{
"status": "affected",
"version": "22.0 ap368216"
},
{
"status": "affected",
"version": "22.0 ap369934"
},
{
"status": "affected",
"version": "22.0 ap368326"
},
{
"status": "affected",
"version": "22.0 ap369219"
},
{
"status": "affected",
"version": "22.0 ap369227"
},
{
"status": "affected",
"version": "22.0 ap368422"
},
{
"status": "affected",
"version": "22.0 ap369881"
},
{
"status": "affected",
"version": "22.0 ap369550"
},
{
"status": "affected",
"version": "22.0 ap369668"
},
{
"status": "affected",
"version": "22.0 ap369571"
},
{
"status": "affected",
"version": "22.0 ap372433"
},
{
"status": "affected",
"version": "22.0 ap370654"
},
{
"status": "affected",
"version": "22.0 ap370138"
},
{
"status": "affected",
"version": "22.0 ap370615"
},
{
"status": "affected",
"version": "22.0 ap372643"
},
{
"status": "affected",
"version": "22.0 ap372708"
},
{
"status": "affected",
"version": "22.0 ap370590"
},
{
"status": "affected",
"version": "22.0 ap372390"
},
{
"status": "affected",
"version": "22.0 ap372757"
},
{
"status": "affected",
"version": "22.0 ap370636"
},
{
"status": "affected",
"version": "22.0 ap372750"
},
{
"status": "affected",
"version": "22.0 ap372706"
},
{
"status": "affected",
"version": "22.0 ap370269"
},
{
"status": "affected",
"version": "22.0 ap370180"
},
{
"status": "affected",
"version": "22.0 ap370675"
},
{
"status": "affected",
"version": "22.0 ap370737"
},
{
"status": "affected",
"version": "22.0 ap370424"
},
{
"status": "affected",
"version": "22.0 ap370544"
},
{
"status": "affected",
"version": "22.0 ap374339"
},
{
"status": "affected",
"version": "22.0 ap370459"
},
{
"status": "affected",
"version": "22.0 ap370545"
},
{
"status": "affected",
"version": "22.0 ap370389"
},
{
"status": "affected",
"version": "22.0 ap374803"
},
{
"status": "affected",
"version": "22.0 ap370358"
},
{
"status": "affected",
"version": "22.0 ap373539"
},
{
"status": "affected",
"version": "22.0 ap373118"
},
{
"status": "affected",
"version": "22.0 ap373855"
},
{
"status": "affected",
"version": "22.0 ap373820"
},
{
"status": "affected",
"version": "22.0 ap373438"
},
{
"status": "affected",
"version": "22.0 ap374660"
},
{
"status": "affected",
"version": "22.0 ap373018"
},
{
"status": "affected",
"version": "22.0 ap373954"
},
{
"status": "affected",
"version": "22.0 ap374230"
},
{
"status": "affected",
"version": "22.0 ap374330"
},
{
"status": "affected",
"version": "22.0 ap374460"
},
{
"status": "affected",
"version": "22.0 ap372956"
},
{
"status": "affected",
"version": "22.0 ap373111"
},
{
"status": "affected",
"version": "22.0 ap374114"
},
{
"status": "affected",
"version": "22.0 ap373122"
},
{
"status": "affected",
"version": "22.0 ap373108"
},
{
"status": "affected",
"version": "22.0 ap374356"
},
{
"status": "affected",
"version": "22.0 ap375069"
},
{
"status": "affected",
"version": "22.0 ap373899"
},
{
"status": "affected",
"version": "22.0 ap374971"
},
{
"status": "affected",
"version": "22.0 ap375862"
},
{
"status": "affected",
"version": "22.0 ap375354"
},
{
"status": "affected",
"version": "22.0 ap375688"
},
{
"status": "affected",
"version": "22.0 ap373046"
},
{
"status": "affected",
"version": "22.0 ap373452"
},
{
"status": "affected",
"version": "22.0 ap374334"
},
{
"status": "affected",
"version": "22.0 ap374428"
},
{
"status": "affected",
"version": "22.0 ap374596"
},
{
"status": "affected",
"version": "22.0 ap372963"
},
{
"status": "affected",
"version": "22.0 ap376041"
},
{
"status": "affected",
"version": "22.0 ap376410"
},
{
"status": "affected",
"version": "22.0 ap376298"
},
{
"status": "affected",
"version": "22.0 ap372799"
},
{
"status": "affected",
"version": "22.0 ap376181"
},
{
"status": "affected",
"version": "22.0 ap375090"
},
{
"status": "affected",
"version": "22.0 ap376416"
},
{
"status": "affected",
"version": "22.0 ap373098"
},
{
"status": "affected",
"version": "22.0 ap375937"
},
{
"status": "affected",
"version": "22.0 ap376531"
},
{
"status": "affected",
"version": "22.0 ap375465"
},
{
"status": "affected",
"version": "22.0 ap376100"
},
{
"status": "affected",
"version": "22.0 ap375634"
},
{
"status": "affected",
"version": "22.0 ap375091"
},
{
"status": "affected",
"version": "22.0 ap375018"
},
{
"status": "affected",
"version": "22.0 ap375743"
},
{
"status": "affected",
"version": "22.0 ap375383"
},
{
"status": "affected",
"version": "22.0 ap375719"
},
{
"status": "affected",
"version": "22.0 ap376614"
},
{
"status": "affected",
"version": "22.0 ap376541"
},
{
"status": "affected",
"version": "22.0 ap375685"
},
{
"status": "affected",
"version": "22.0 ap374895"
},
{
"status": "affected",
"version": "22.0 ap376429"
},
{
"status": "affected",
"version": "22.0 ap379838"
},
{
"status": "affected",
"version": "22.0 ap380187"
},
{
"status": "affected",
"version": "22.0 ap380143"
},
{
"status": "affected",
"version": "22.0 ap379972"
},
{
"status": "affected",
"version": "22.0 ap380535"
},
{
"status": "affected",
"version": "22.0 ap380117"
},
{
"status": "affected",
"version": "22.0 ap380473"
},
{
"status": "affected",
"version": "22.0 ap375924"
},
{
"status": "affected",
"version": "22.0 ap379833"
},
{
"status": "affected",
"version": "22.0 ap376661"
},
{
"status": "affected",
"version": "22.0 ap380041"
},
{
"status": "affected",
"version": "22.0 ap380391"
},
{
"status": "affected",
"version": "22.0 ap379795"
},
{
"status": "affected",
"version": "22.0 ap376701"
},
{
"status": "affected",
"version": "22.0 ap376668"
},
{
"status": "affected",
"version": "22.0 ap377384"
},
{
"status": "affected",
"version": "22.0 ap377480"
},
{
"status": "affected",
"version": "22.0 ap377581"
},
{
"status": "affected",
"version": "22.0 ap376652"
},
{
"status": "affected",
"version": "22.0 ap376620"
},
{
"status": "affected",
"version": "22.0 ap378405"
},
{
"status": "affected",
"version": "22.0 ap377494"
},
{
"status": "affected",
"version": "22.0 ap378440"
},
{
"status": "affected",
"version": "22.0 ap378581"
},
{
"status": "affected",
"version": "22.0 ap377307"
},
{
"status": "affected",
"version": "22.0 ap377566"
},
{
"status": "affected",
"version": "22.0 ap378585"
},
{
"status": "affected",
"version": "22.0 ap377149"
},
{
"status": "affected",
"version": "22.0 ap378471"
},
{
"status": "affected",
"version": "22.0 ap377412"
},
{
"status": "affected",
"version": "22.0 ap377068"
},
{
"status": "affected",
"version": "22.0 ap377757"
},
{
"status": "affected",
"version": "22.0 ap378332"
},
{
"status": "affected",
"version": "22.0 ap379016"
},
{
"status": "affected",
"version": "22.0 ap378866"
},
{
"status": "affected",
"version": "22.0 ap378079"
},
{
"status": "affected",
"version": "22.0 ap378509"
},
{
"status": "affected",
"version": "22.0 ap378953"
},
{
"status": "affected",
"version": "22.0 ap377779"
},
{
"status": "affected",
"version": "22.0 ap379008"
},
{
"status": "affected",
"version": "22.0 ap379694"
},
{
"status": "affected",
"version": "22.0 ap379597"
},
{
"status": "affected",
"version": "22.0 ap378882"
},
{
"status": "affected",
"version": "22.0 ap379389"
},
{
"status": "affected",
"version": "22.0 ap379487"
},
{
"status": "affected",
"version": "22.0 ap379374"
},
{
"status": "affected",
"version": "22.0 ap380771"
},
{
"status": "affected",
"version": "22.0 ap381594"
},
{
"status": "affected",
"version": "22.0 ap381243"
},
{
"status": "affected",
"version": "22.0 ap380629"
},
{
"status": "affected",
"version": "22.0 ap380751"
},
{
"status": "affected",
"version": "22.0 ap382158"
},
{
"status": "affected",
"version": "22.0 ap378999"
},
{
"status": "affected",
"version": "22.0 ap381136"
},
{
"status": "affected",
"version": "22.0 ap382240"
},
{
"status": "affected",
"version": "22.0 ap382362"
},
{
"status": "affected",
"version": "22.0 ap382192"
},
{
"status": "affected",
"version": "22.0 ap381091"
},
{
"status": "affected",
"version": "22.0 ap382251"
},
{
"status": "affected",
"version": "22.0 ap381732"
},
{
"status": "affected",
"version": "22.0 ap381584"
},
{
"status": "affected",
"version": "22.0 ap381118"
},
{
"status": "affected",
"version": "22.0 ap382717"
},
{
"status": "affected",
"version": "22.0 ap383569"
},
{
"status": "affected",
"version": "22.0 ap382487"
},
{
"status": "affected",
"version": "22.0 ap383002"
},
{
"status": "affected",
"version": "22.0 ap382434"
},
{
"status": "affected",
"version": "22.0 ap383170"
},
{
"status": "affected",
"version": "22.0 ap383309"
},
{
"status": "affected",
"version": "22.0 ap383514"
},
{
"status": "affected",
"version": "22.0 ap383710"
},
{
"status": "affected",
"version": "22.0 ap382977"
},
{
"status": "affected",
"version": "22.0 ap382488"
},
{
"status": "affected",
"version": "22.0 ap383134"
},
{
"status": "affected",
"version": "22.0 ap359429"
},
{
"status": "affected",
"version": "21.sp1 ap351795"
},
{
"status": "affected",
"version": "21.sp1 ap348143"
},
{
"status": "affected",
"version": "21.sp1 ap351216"
},
{
"status": "affected",
"version": "21.sp1 ap339376"
},
{
"status": "affected",
"version": "21.sp1 ap358132"
},
{
"status": "affected",
"version": "21.sp1 ap355717"
},
{
"status": "affected",
"version": "21.sp1 ap346074"
},
{
"status": "affected",
"version": "21.sp1 ap373102"
},
{
"status": "affected",
"version": "21.sp1 ap235252"
},
{
"status": "affected",
"version": "21.sp1 ap242300"
},
{
"status": "affected",
"version": "21.sp1 ap338964"
},
{
"status": "affected",
"version": "21.sp1 ap339196"
},
{
"status": "affected",
"version": "21.sp1 ap341645"
},
{
"status": "affected",
"version": "21.sp1 ap341897"
},
{
"status": "affected",
"version": "21.sp1 ap342461"
},
{
"status": "affected",
"version": "21.sp1 ap342625"
},
{
"status": "affected",
"version": "21.sp1 ap342755"
},
{
"status": "affected",
"version": "21.sp1 ap342853"
},
{
"status": "affected",
"version": "21.sp1 ap343352"
},
{
"status": "affected",
"version": "21.sp1 ap344270"
},
{
"status": "affected",
"version": "21.sp1 ap344479"
},
{
"status": "affected",
"version": "21.sp1 ap344681"
},
{
"status": "affected",
"version": "21.sp1 ap345054"
},
{
"status": "affected",
"version": "21.sp1 ap345293"
},
{
"status": "affected",
"version": "21.sp1 ap345755"
},
{
"status": "affected",
"version": "21.sp1 ap348472"
},
{
"status": "affected",
"version": "21.sp1 ap349222"
},
{
"status": "affected",
"version": "21.sp1 ap350050"
},
{
"status": "affected",
"version": "21.sp1 ap350189"
},
{
"status": "affected",
"version": "21.sp1 ap351248"
},
{
"status": "affected",
"version": "21.sp1 ap351295"
},
{
"status": "affected",
"version": "21.sp1 ap351530"
},
{
"status": "affected",
"version": "21.sp1 ap351754"
},
{
"status": "affected",
"version": "21.sp1 ap351898"
},
{
"status": "affected",
"version": "21.sp1 ap352082"
},
{
"status": "affected",
"version": "21.sp1 ap352205"
},
{
"status": "affected",
"version": "21.sp1 ap352972"
},
{
"status": "affected",
"version": "21.sp1 ap353418"
},
{
"status": "affected",
"version": "21.sp1 ap353841"
},
{
"status": "affected",
"version": "21.sp1 ap354707"
},
{
"status": "affected",
"version": "21.sp1 ap356271"
},
{
"status": "affected",
"version": "21.sp1 ap356787"
},
{
"status": "affected",
"version": "21.sp1 ap357574"
},
{
"status": "affected",
"version": "21.sp1 ap358730"
},
{
"status": "affected",
"version": "21.sp1 ap360211"
},
{
"status": "affected",
"version": "21.sp1 ap360306"
},
{
"status": "affected",
"version": "21.sp1 ap361420"
},
{
"status": "affected",
"version": "21.sp1 ap365379"
},
{
"status": "affected",
"version": "21.sp1 ap365390"
},
{
"status": "affected",
"version": "21.sp1 ap366348"
},
{
"status": "affected",
"version": "21.sp1 ap374822"
},
{
"status": "affected",
"version": "21.sp1 ap375026"
},
{
"status": "affected",
"version": "21.sp1 ap375053"
},
{
"status": "affected",
"version": "21.0 ap349066"
},
{
"status": "affected",
"version": "21.0 ap364358"
},
{
"status": "affected",
"version": "21.0 ap362637"
},
{
"status": "affected",
"version": "21.0 ap342145"
},
{
"status": "affected",
"version": "21.0 ap357571"
},
{
"status": "affected",
"version": "21.0 ap362825"
},
{
"status": "affected",
"version": "21.0 ap361559"
},
{
"status": "affected",
"version": "21.0 ap339395"
},
{
"status": "affected",
"version": "21.0 ap348945"
},
{
"status": "affected",
"version": "21.0 ap346902"
},
{
"status": "affected",
"version": "21.0 ap350308"
},
{
"status": "affected",
"version": "21.0 ap363301"
},
{
"status": "affected",
"version": "21.0 ap349850"
},
{
"status": "affected",
"version": "21.0 ap344752"
},
{
"status": "affected",
"version": "21.0 ap347640"
},
{
"status": "affected",
"version": "21.0 ap350111"
},
{
"status": "affected",
"version": "21.0 ap355616"
},
{
"status": "affected",
"version": "21.0 ap353841"
},
{
"status": "affected",
"version": "21.0 ap346128"
},
{
"status": "affected",
"version": "21.0 ap350204"
},
{
"status": "affected",
"version": "21.0 ap341897"
},
{
"status": "affected",
"version": "21.0 ap347064"
},
{
"status": "affected",
"version": "21.0 ap350032"
},
{
"status": "affected",
"version": "21.0 ap351261"
},
{
"status": "affected",
"version": "21.0 ap352182"
},
{
"status": "affected",
"version": "21.0 ap350760"
},
{
"status": "affected",
"version": "21.0 ap363408"
},
{
"status": "affected",
"version": "21.sp1 ap340545"
},
{
"status": "affected",
"version": "21.sp1 ap341683"
},
{
"status": "affected",
"version": "21.sp1 ap341909"
},
{
"status": "affected",
"version": "21.sp1 ap342214"
},
{
"status": "affected",
"version": "21.sp1 ap344301"
},
{
"status": "affected",
"version": "21.sp1 ap344783"
},
{
"status": "affected",
"version": "21.sp1 ap346270"
},
{
"status": "affected",
"version": "21.sp1 ap346351"
},
{
"status": "affected",
"version": "21.sp1 ap347928"
},
{
"status": "affected",
"version": "21.sp1 ap349517"
},
{
"status": "affected",
"version": "21.sp1 ap349090"
},
{
"status": "affected",
"version": "21.sp1 ap351315"
},
{
"status": "affected",
"version": "21.sp1 ap352304"
},
{
"status": "affected",
"version": "21.sp1 ap351738"
},
{
"status": "affected",
"version": "21.sp1 ap354194"
},
{
"status": "affected",
"version": "21.sp1 ap357347"
},
{
"status": "affected",
"version": "21.sp1 ap364778"
},
{
"status": "affected",
"version": "21.sp1 ap372422"
},
{
"status": "affected",
"version": "21.sp1 ap371281"
},
{
"status": "affected",
"version": "21.sp1 ap370908"
},
{
"status": "affected",
"version": "21.sp1 ap379493"
},
{
"status": "affected",
"version": "21.sp1 ap380506"
},
{
"status": "affected",
"version": "21.sp9 ap360116"
},
{
"status": "affected",
"version": "21.sp9 ap367207"
},
{
"status": "affected",
"version": "RI.2021.02"
},
{
"status": "affected",
"version": "RI.2021.08"
},
{
"status": "affected",
"version": "RI.2021.09"
},
{
"status": "affected",
"version": "RI.2021.10"
},
{
"status": "affected",
"version": "RI.2021.11"
},
{
"status": "affected",
"version": "RI.2021.12"
},
{
"status": "affected",
"version": "RI.2022.02"
},
{
"status": "affected",
"version": "RI.2022.03"
},
{
"status": "affected",
"version": "RI.2022.04"
},
{
"status": "affected",
"version": "RI.2022.07"
},
{
"status": "affected",
"version": "RI.2022.06"
},
{
"status": "affected",
"version": "RI.2022.05"
},
{
"status": "affected",
"version": "RI.2022.08"
},
{
"status": "affected",
"version": "RI.2022.09"
},
{
"status": "affected",
"version": "RI.2022.10"
},
{
"status": "affected",
"version": "RI.2022.12"
},
{
"status": "affected",
"version": "RI.2023.01"
},
{
"status": "affected",
"version": "RI.2023.03"
},
{
"status": "affected",
"version": "RI.2023.02"
},
{
"status": "affected",
"version": "RI.2023.04"
},
{
"status": "affected",
"version": "RI.2023.05"
},
{
"status": "affected",
"version": "RI.2023.07"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.\r\n\r This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "Improper Authentication",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:58:28.743Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-bw-auth-bypass-kCggMWhX",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX"
}
],
"source": {
"advisory": "cisco-sa-bw-auth-bypass-kCggMWhX",
"defects": [
"CSCwh02758"
],
"discovery": "INTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20238",
"datePublished": "2023-09-06T17:08:28.178Z",
"dateReserved": "2022-10-27T18:47:50.370Z",
"dateUpdated": "2024-10-23T19:41:58.912Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…