Lucene search

K
cveCiscoCVE-2020-3151
HistoryAug 26, 2020 - 5:15 p.m.

CVE-2020-3151

2020-08-2617:15:13
CWE-287
cisco
web.nvd.nist.gov
25
cisco
connected mobile experiences
cmx
vulnerability
bypass
cli
security
nvd
authentication

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

5.1%

A vulnerability in the CLI of Cisco Connected Mobile Experiences (CMX) could allow an authenticated, local attacker with administrative credentials to bypass restrictions on the CLI. The vulnerability is due to insufficient security mechanisms in the restricted shell implementation. An attacker could exploit this vulnerability by sending crafted commands to the CLI. A successful exploit could allow the attacker to escape the restricted shell and execute a set of normally unauthorized commands with the privileges of a non-root user. To exploit this vulnerability, an attacker would need to have valid administrative credentials.

Affected configurations

Nvd
Node
ciscoconnected_mobile_experiencesMatch10.6.0
OR
ciscoconnected_mobile_experiencesMatch10.6.1
OR
ciscoconnected_mobile_experiencesMatch10.6.2
VendorProductVersionCPE
ciscoconnected_mobile_experiences10.6.0cpe:2.3:a:cisco:connected_mobile_experiences:10.6.0:*:*:*:*:*:*:*
ciscoconnected_mobile_experiences10.6.1cpe:2.3:a:cisco:connected_mobile_experiences:10.6.1:*:*:*:*:*:*:*
ciscoconnected_mobile_experiences10.6.2cpe:2.3:a:cisco:connected_mobile_experiences:10.6.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco Connected Mobile Experiences",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2020-3151