mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
186 lines
8.7 KiB
JSON
186 lines
8.7 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-20026",
|
|
"ASSIGNER": "psirt@cisco.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device. This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Cisco",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Cisco Small Business RV Series Router Firmware",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "2.0.0.19-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "2.0.2.01-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "1.3.12.19-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "1.3.12.6-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "1.3.13.02-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "1.3.9.8-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.0.0.7",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.0.2.08-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.0.3.03-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.0.4.02-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.1.02",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.2.08",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.03",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.06",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.07",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.08",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.09",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.10",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.2.3.14",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "3.0.0.1-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "3.0.0.19-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "3.0.2.01-tm",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.1.1.01",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "4.1.0.02-tm",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5",
|
|
"refsource": "MISC",
|
|
"name": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "cisco-sa-sbr042-multi-vuln-ej76Pke5",
|
|
"discovery": "EXTERNAL",
|
|
"defects": [
|
|
"CSCwd60199"
|
|
]
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory.\r\n\r\nThe Cisco PSIRT is not aware of any malicious use of the vulnerabilities that are described in this advisory."
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE"
|
|
}
|
|
]
|
|
}
|
|
} |