Lucene search

K
cve[email protected]CVE-2023-20040
HistoryJan 20, 2023 - 7:15 a.m.

CVE-2023-20040

2023-01-2007:15:15
CWE-434
CWE-23
web.nvd.nist.gov
38
vulnerability
netconf
cisco
nso
dos
authentication
remote
exploit
file upload
filesystem
root user
nvd
cve-2023-20040

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%

A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group.

This vulnerability exists because user-supplied input is not properly validated when NETCONF is used to upload packages to an affected device. An attacker could exploit this vulnerability by uploading a specially crafted package file. A successful exploit could allow the attacker to write crafted files to arbitrary locations on the filesystem or delete arbitrary files from the filesystem of an affected device, resulting in a DoS condition.

Note: By default, during install, Cisco NSO will be set up to run as the root user unless the --run-as-user option is used.

Affected configurations

NVD
Node
cisconetwork_services_orchestratorRange3.35.4.7
OR
cisconetwork_services_orchestratorRange5.55.5.6
OR
cisconetwork_services_orchestratorRange5.65.6.7
OR
cisconetwork_services_orchestratorRange5.75.7.4
OR
cisconetwork_services_orchestratorMatch5.8

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Network Services Orchestrator",
    "versions": [
      {
        "version": "4.7.3",
        "status": "affected"
      }
    ]
  }
]

5.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.8%

Related for CVE-2023-20040