Lucene search

K
cveIllumioCVE-2023-5183
HistorySep 27, 2023 - 3:19 p.m.

CVE-2023-5183

2023-09-2715:19:42
CWE-502
Illumio
web.nvd.nist.gov
2471
cve-2023-5183
json
deserialization
code execution
illumio pce
vulnerability
network_traffic api
operating system
user
nvd

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

26.7%

Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.

Affected configurations

Nvd
Node
illumiocore_policy_compute_engineRange<19.3.7
OR
illumiocore_policy_compute_engineRange21.2.021.2.8
OR
illumiocore_policy_compute_engineRange21.5.021.5.36
OR
illumiocore_policy_compute_engineRange22.2.022.2.42
OR
illumiocore_policy_compute_engineRange22.5.022.5.31
OR
illumiocore_policy_compute_engineRange23.2.023.2.11
VendorProductVersionCPE
illumiocore_policy_compute_engine*cpe:2.3:a:illumio:core_policy_compute_engine:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "PCE"
    ],
    "platforms": [
      "Linux"
    ],
    "product": "Core PCE",
    "vendor": "Illumio",
    "versions": [
      {
        "lessThanOrEqual": "19.3.6",
        "status": "affected",
        "version": "19.3.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.2.7",
        "status": "affected",
        "version": "21.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.5.35",
        "status": "affected",
        "version": "21.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.2.41",
        "status": "affected",
        "version": "22.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.5.30",
        "status": "affected",
        "version": "22.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "23.2.10",
        "status": "affected",
        "version": "23.2.0",
        "versionType": "release train"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

26.7%

Related for CVE-2023-5183