{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2023-20223", "ASSIGNER": "psirt@cisco.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository that belongs to an internal service on an affected device.\r\n\r This vulnerability is due to insufficient access control enforcement on API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control", "cweId": "CWE-284" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Cisco", "product": { "product_data": [ { "product_name": "Cisco Digital Network Architecture Center (DNA Center)", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.2.1.3" }, { "version_affected": "=", "version_value": "2.2.3.4" }, { "version_affected": "=", "version_value": "2.2.3.3" }, { "version_affected": "=", "version_value": "2.2.3.5" }, { "version_affected": "=", "version_value": "2.2.3.6" }, { "version_affected": "=", "version_value": "2.3.3.4" }, { "version_affected": "=", "version_value": "2.3.3.5" }, { "version_affected": "=", "version_value": "2.3.3.6" }, { "version_affected": "=", "version_value": "2.3.3.7" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ins-acc-con-nHAVDRBZ", "refsource": "MISC", "name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ins-acc-con-nHAVDRBZ" } ] }, "source": { "advisory": "cisco-sa-dnac-ins-acc-con-nHAVDRBZ", "discovery": "INTERNAL", "defects": [ "CSCwe98803" ] }, "exploit": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": [ { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW" } ] } }