CVE-2023-20210
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2023
Last modified:
25/01/2024
Description
A vulnerability in Cisco BroadWorks could allow an authenticated, local attacker to elevate privileges to the root user on an affected device.<br />
<br />
The vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing a crafted command to the affected system. A successful exploit could allow the attacker to execute commands as the root user. To exploit this vulnerability, an attacker must have valid BroadWorks administrative privileges on the affected device.
Impact
Base Score 3.x
6.00
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:broadworks_application_delivery_platform_firmware:23.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_application_delivery_platform_firmware:24.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_application_delivery_platform_firmware:25.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:broadworks_application_delivery_platform:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_application_server_firmware:23.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_application_server_firmware:24.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_application_server_firmware:25.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:broadworks_application_server:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_server_firmware:23.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_server_firmware:24.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_server_firmware:25.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:broadworks_database_server:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_troubleshooting_server_firmware:23.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_troubleshooting_server_firmware:24.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:broadworks_database_troubleshooting_server_firmware:25.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



