mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 18:51:16 +00:00
201 lines
6.9 KiB
JSON
201 lines
6.9 KiB
JSON
{
|
|
"id": "CVE-2023-20046",
|
|
"sourceIdentifier": "psirt@cisco.com",
|
|
"published": "2023-05-09T18:15:11.697",
|
|
"lastModified": "2024-11-21T07:40:25.733",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.\r\n\r There are workarounds that address this vulnerability."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "psirt@cisco.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-289"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-522"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "21.22.14",
|
|
"matchCriteriaId": "1280E939-FA8A-49E4-AE06-616B152929CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "21.23.0",
|
|
"versionEndExcluding": "21.23.31",
|
|
"matchCriteriaId": "5A2C7A63-E17A-487D-8CCF-3346FDA2859F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "21.25.0",
|
|
"versionEndExcluding": "21.25.15",
|
|
"matchCriteriaId": "1B58A574-77D9-4EC5-9D57-8D244EF7BDB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "21.26.0",
|
|
"versionEndExcluding": "21.26.17",
|
|
"matchCriteriaId": "E9507CCB-0340-40D6-AAF3-D2EA3D3EE408"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "21.27.0",
|
|
"versionEndExcluding": "21.27.6",
|
|
"matchCriteriaId": "0D9F9D50-DA13-410A-9571-6FA9436165E8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "21.28.0",
|
|
"versionEndExcluding": "21.28.3",
|
|
"matchCriteriaId": "833F9A52-2976-4F2C-AA87-FD50BB83BB3D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:21.23.n:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CD63EE8D-0389-4589-BF86-0F64A8AEDA13"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:21.24:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0534E44-1CD6-49CB-A574-D7B2CF14CC25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:21.27.m:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CC1BBD53-BF16-4841-9D20-D2C4129A337B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:cisco:staros:21.28.m:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "47DCE4FD-48D4-4B25-BBAE-24D270627FCD"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "746254AC-B039-432C-AA5C-A82260E57AD7"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "301681DF-2A9E-4A91-9918-4A46153ADC01"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9EF0299-16A7-446D-855D-BFF91EE65534"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vpc-di:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "775B2FC4-E182-47F8-B786-EC6A359BCCE3"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:cisco:vpc-si:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFD5A5BE-9B00-4E4F-A4A4-FBEF990F4C39"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
|
|
"source": "psirt@cisco.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ssh-privesc-BmWeJC3h",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |