Lucene search

K
ciscoCiscoCISCO-SA-CSW-AUTH-OPENAPI-KTNDJDNX
HistoryJun 07, 2023 - 4:00 p.m.

Cisco Secure Workload Authenticated OpenAPI Privilege Escalation Vulnerability

2023-06-0716:00:00
tools.cisco.com
17
cisco
secure workload
openapi
privilege escalation
vulnerability
remote attack
rbac
software update
user credentials

EPSS

0.001

Percentile

26.2%

A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials.

This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-auth-openapi-kTndjdNX [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-csw-auth-openapi-kTndjdNX”]

Affected configurations

Vulners
Node
ciscosecure_workloadMatchany
OR
ciscosecure_workloadMatchany
VendorProductVersionCPE
ciscosecure_workloadanycpe:2.3:a:cisco:secure_workload:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

26.2%

Related for CISCO-SA-CSW-AUTH-OPENAPI-KTNDJDNX