Lucene search

K
ciscoCiscoCISCO-SA-BW-PRIV-ESC-QTGUZOSQ
HistoryJul 19, 2023 - 4:00 p.m.

Cisco BroadWorks Privilege Escalation Vulnerability

2023-07-1916:00:00
tools.cisco.com
18
cisco
broadworks
privilege escalation
vulnerability
user role permissions
software updates
security advisory

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.

This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ”]

Affected configurations

Vulners
Node
ciscobroadworksMatchany
OR
ciscobroadworksMatchany
CPENameOperatorVersion
cisco broadworkseqany
cisco broadworkseqany

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-BW-PRIV-ESC-QTGUZOSQ