gsd-2023-20063
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-20063", "id": "GSD-2023-20063" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-20063" ], "details": "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device.", "id": "GSD-2023-20063", "modified": "2023-12-13T01:20:28.580385Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2023-20063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco Firepower Management Center", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.2.3" }, { "version_affected": "=", "version_value": "6.2.3.1" }, { "version_affected": "=", "version_value": "6.2.3.2" }, { "version_affected": "=", "version_value": "6.2.3.3" }, { "version_affected": "=", "version_value": "6.2.3.4" }, { "version_affected": "=", "version_value": "6.2.3.5" }, { "version_affected": "=", "version_value": "6.2.3.6" }, { "version_affected": "=", "version_value": "6.2.3.7" }, { "version_affected": "=", "version_value": "6.2.3.9" }, { "version_affected": "=", "version_value": "6.2.3.10" }, { "version_affected": "=", "version_value": "6.2.3.11" }, { "version_affected": "=", "version_value": "6.2.3.12" }, { "version_affected": "=", "version_value": "6.2.3.13" }, { "version_affected": "=", "version_value": "6.2.3.14" }, { "version_affected": "=", "version_value": "6.2.3.15" }, { "version_affected": "=", "version_value": "6.2.3.8" }, { "version_affected": "=", "version_value": "6.2.3.16" }, { "version_affected": "=", "version_value": "6.2.3.17" }, { "version_affected": "=", "version_value": "6.2.3.18" }, { "version_affected": "=", "version_value": "6.4.0" }, { "version_affected": "=", "version_value": "6.4.0.1" }, { "version_affected": "=", "version_value": "6.4.0.3" }, { "version_affected": "=", "version_value": "6.4.0.2" }, { "version_affected": "=", "version_value": "6.4.0.4" }, { "version_affected": "=", "version_value": "6.4.0.5" }, { "version_affected": "=", "version_value": "6.4.0.6" }, { "version_affected": "=", "version_value": "6.4.0.7" }, { "version_affected": "=", "version_value": "6.4.0.8" }, { "version_affected": "=", "version_value": "6.4.0.9" }, { "version_affected": "=", "version_value": "6.4.0.10" }, { "version_affected": "=", "version_value": "6.4.0.11" }, { "version_affected": "=", "version_value": "6.4.0.12" }, { "version_affected": "=", "version_value": "6.4.0.13" }, { "version_affected": "=", "version_value": "6.4.0.14" }, { "version_affected": "=", "version_value": "6.4.0.15" }, { "version_affected": "=", "version_value": "6.4.0.16" }, { "version_affected": "=", "version_value": "6.4.0.17" }, { "version_affected": "=", "version_value": "6.6.0" }, { "version_affected": "=", "version_value": "6.6.0.1" }, { "version_affected": "=", "version_value": "6.6.1" }, { "version_affected": "=", "version_value": "6.6.3" }, { "version_affected": "=", "version_value": "6.6.4" }, { "version_affected": "=", "version_value": "6.6.5" }, { "version_affected": "=", "version_value": "6.6.5.1" }, { "version_affected": "=", "version_value": "6.6.5.2" }, { "version_affected": "=", "version_value": "6.6.7" }, { "version_affected": "=", "version_value": "6.6.7.1" }, { "version_affected": "=", "version_value": "6.7.0" }, { "version_affected": "=", "version_value": "6.7.0.1" }, { "version_affected": "=", "version_value": "6.7.0.2" }, { "version_affected": "=", "version_value": "6.7.0.3" }, { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" }, { "version_affected": "=", "version_value": "7.0.2" }, { "version_affected": "=", "version_value": "7.0.2.1" }, { "version_affected": "=", "version_value": "7.0.3" }, { "version_affected": "=", "version_value": "7.0.4" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.1.0" }, { "version_affected": "=", "version_value": "7.1.0.1" }, { "version_affected": "=", "version_value": "7.1.0.2" }, { "version_affected": "=", "version_value": "7.1.0.3" }, { "version_affected": "=", "version_value": "7.2.0" }, { "version_affected": "=", "version_value": "7.2.1" }, { "version_affected": "=", "version_value": "7.2.2" }, { "version_affected": "=", "version_value": "7.2.0.1" }, { "version_affected": "=", "version_value": "7.2.3" }, { "version_affected": "=", "version_value": "7.2.3.1" } ] } }, { "product_name": "Cisco Firepower Threat Defense Software", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.2.3" }, { "version_affected": "=", "version_value": "6.2.3.1" }, { "version_affected": "=", "version_value": "6.2.3.2" }, { "version_affected": "=", "version_value": "6.2.3.3" }, { "version_affected": "=", "version_value": "6.2.3.4" }, { "version_affected": "=", "version_value": "6.2.3.5" }, { "version_affected": "=", "version_value": "6.2.3.6" }, { "version_affected": "=", "version_value": "6.2.3.7" }, { "version_affected": "=", "version_value": "6.2.3.8" }, { "version_affected": "=", "version_value": "6.2.3.10" }, { "version_affected": "=", "version_value": "6.2.3.11" }, { "version_affected": "=", "version_value": "6.2.3.9" }, { "version_affected": "=", "version_value": "6.2.3.12" }, { "version_affected": "=", "version_value": "6.2.3.13" }, { "version_affected": "=", "version_value": "6.2.3.14" }, { "version_affected": "=", "version_value": "6.2.3.15" }, { "version_affected": "=", "version_value": "6.2.3.16" }, { "version_affected": "=", "version_value": "6.2.3.17" }, { "version_affected": "=", "version_value": "6.2.3.18" }, { "version_affected": "=", "version_value": "6.6.0" }, { "version_affected": "=", "version_value": "6.6.0.1" }, { "version_affected": "=", "version_value": "6.6.1" }, { "version_affected": "=", "version_value": "6.6.3" }, { "version_affected": "=", "version_value": "6.6.4" }, { "version_affected": "=", "version_value": "6.6.5" }, { "version_affected": "=", "version_value": "6.6.5.1" }, { "version_affected": "=", "version_value": "6.6.5.2" }, { "version_affected": "=", "version_value": "6.6.7" }, { "version_affected": "=", "version_value": "6.6.7.1" }, { "version_affected": "=", "version_value": "6.4.0" }, { "version_affected": "=", "version_value": "6.4.0.1" }, { "version_affected": "=", "version_value": "6.4.0.3" }, { "version_affected": "=", "version_value": "6.4.0.2" }, { "version_affected": "=", "version_value": "6.4.0.4" }, { "version_affected": "=", "version_value": "6.4.0.5" }, { "version_affected": "=", "version_value": "6.4.0.6" }, { "version_affected": "=", "version_value": "6.4.0.7" }, { "version_affected": "=", "version_value": "6.4.0.8" }, { "version_affected": "=", "version_value": "6.4.0.9" }, { "version_affected": "=", "version_value": "6.4.0.10" }, { "version_affected": "=", "version_value": "6.4.0.11" }, { "version_affected": "=", "version_value": "6.4.0.12" }, { "version_affected": "=", "version_value": "6.4.0.13" }, { "version_affected": "=", "version_value": "6.4.0.14" }, { "version_affected": "=", "version_value": "6.4.0.15" }, { "version_affected": "=", "version_value": "6.4.0.16" }, { "version_affected": "=", "version_value": "6.4.0.17" }, { "version_affected": "=", "version_value": "6.7.0" }, { "version_affected": "=", "version_value": "6.7.0.1" }, { "version_affected": "=", "version_value": "6.7.0.2" }, { "version_affected": "=", "version_value": "6.7.0.3" }, { "version_affected": "=", "version_value": "7.0.0" }, { "version_affected": "=", "version_value": "7.0.0.1" }, { "version_affected": "=", "version_value": "7.0.1" }, { "version_affected": "=", "version_value": "7.0.1.1" }, { "version_affected": "=", "version_value": "7.0.2" }, { "version_affected": "=", "version_value": "7.0.2.1" }, { "version_affected": "=", "version_value": "7.0.3" }, { "version_affected": "=", "version_value": "7.0.4" }, { "version_affected": "=", "version_value": "7.0.5" }, { "version_affected": "=", "version_value": "7.1.0" }, { "version_affected": "=", "version_value": "7.1.0.1" }, { "version_affected": "=", "version_value": "7.1.0.3" }, { "version_affected": "=", "version_value": "7.2.0" }, { "version_affected": "=", "version_value": "7.2.0.1" }, { "version_affected": "=", "version_value": "7.2.1" }, { "version_affected": "=", "version_value": "7.2.2" }, { "version_affected": "=", "version_value": "7.2.3" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-94", "lang": "eng", "value": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L", "refsource": "MISC", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L" } ] }, "source": { "advisory": "cisco-sa-ftd-fmc-code-inj-wSHrgz8L", "defects": [ "CSCwb42031" ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6BF3D02-3BA0-4736-B78D-3634E3E91623", "versionEndIncluding": "6.2.3.18", "versionStartIncluding": "6.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FBA1598-02FE-4855-8449-E2FF06EF8276", "versionEndIncluding": "6.4.0.16", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF3259C7-8F36-46B1-A1BA-C2F9AC165A2D", "versionEndIncluding": "6.6.7.1", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BE29E8B-5D64-4CF6-B8CB-A38E991A9BB9", "versionEndIncluding": "7.0.5", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "749D90E8-9009-4F05-8C5E-2521A9BC7D32", "versionEndIncluding": "7.1.0.3", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "E355BD8E-18E7-4405-8F32-0A191DCE0774", "versionEndIncluding": "7.3.1.1", "versionStartIncluding": "7.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "D58D7217-F6F5-4B58-B59C-E5C8781C87A9", "versionEndIncluding": "6.2.3.18", "versionStartIncluding": "6.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "5156C270-7E41-4D2E-B051-F35563EA4402", "versionEndIncluding": "6.4.0.17", "versionStartIncluding": "6.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCDEBE63-3174-4BBC-82DE-E8E25C818E30", "versionEndIncluding": "6.6.7.1", "versionStartIncluding": "6.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "1110632C-526F-4025-A7BE-0CF9F37E5F9E", "versionEndIncluding": "6.7.0.3", "versionStartIncluding": "6.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F51D1A7-A702-4071-85D8-7C77CEB23955", "versionEndIncluding": "7.0.5", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5F30710-F91A-4A7B-AB06-EE49525E6F04", "versionEndIncluding": "7.1.0.3", "versionStartIncluding": "7.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*", "matchCriteriaId": "90854884-399A-465B-ACB7-E493B8D39041", "versionEndIncluding": "7.2.3", "versionStartIncluding": "7.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the inter-device communication mechanisms between devices that are running Cisco Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow an authenticated, local attacker to execute arbitrary commands with root permissions on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by accessing the expert mode of an affected device and submitting specific commands to a connected system. A successful exploit could allow the attacker to execute arbitrary code in the context of an FMC device if the attacker has administrative privileges on an associated FTD device. Alternatively, a successful exploit could allow the attacker to execute arbitrary code in the context of an FTD device if the attacker has administrative privileges on an associated FMC device." }, { "lang": "es", "value": "Una vulnerabilidad en los mecanismos de comunicaci\u00f3n entre dispositivos entre los dispositivos que ejecutan el software Cisco Firepower Threat Defense (FTD) y los dispositivos que ejecutan el software Cisco Firepower Management (FMC) podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios con permisos de root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario. Un atacante podr\u00eda aprovechar esta vulnerabilidad accediendo al modo experto de un dispositivo afectado y enviando comandos espec\u00edficos a un sistema conectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el contexto de un dispositivo FMC si el atacante tiene privilegios administrativos en un dispositivo FTD asociado. Alternativamente, un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario en el contexto de un dispositivo FTD si el atacante tiene privilegios administrativos en un dispositivo FMC asociado." } ], "id": "CVE-2023-20063", "lastModified": "2024-01-25T17:15:28.157", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "ykramarz@cisco.com", "type": "Secondary" } ] }, "published": "2023-11-01T18:15:08.967", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "ykramarz@cisco.com", "type": "Secondary" } ] } } } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.