Lucene search

K
cvelistIllumioCVELIST:CVE-2023-5183
HistorySep 26, 2023 - 9:29 p.m.

CVE-2023-5183 Authenticated RCE due to unsafe JSON deserialization

2023-09-2621:29:36
CWE-502
Illumio
www.cve.org
1
illumio pce
cve-2023-5183
authenticated
rce
unsafe json deserialization
code execution
api authentication
network_traffic endpoint
operating system user

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.001

Percentile

26.7%

Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "PCE"
    ],
    "platforms": [
      "Linux"
    ],
    "product": "Core PCE",
    "vendor": "Illumio",
    "versions": [
      {
        "lessThanOrEqual": "19.3.6",
        "status": "affected",
        "version": "19.3.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.2.7",
        "status": "affected",
        "version": "21.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "21.5.35",
        "status": "affected",
        "version": "21.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.2.41",
        "status": "affected",
        "version": "22.2.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "22.5.30",
        "status": "affected",
        "version": "22.5.0",
        "versionType": "release train"
      },
      {
        "lessThanOrEqual": "23.2.10",
        "status": "affected",
        "version": "23.2.0",
        "versionType": "release train"
      }
    ]
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.001

Percentile

26.7%

Related for CVELIST:CVE-2023-5183