{"id": "CVE-2023-20076", "metrics": {"cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}, {"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}]}, "published": "2023-02-12T04:15:19.287", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-8whGn5dL", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-233"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Cisco IOx application hosting environment could allow an authenticated, remote attacker to execute arbitrary commands as root on the underlying host operating system. This vulnerability is due to incomplete sanitization of parameters that are passed in for activation of an application. An attacker could exploit this vulnerability by deploying and activating an application in the Cisco IOx application hosting environment with a crafted activation payload file. A successful exploit could allow the attacker to execute arbitrary commands as root on the underlying host operating system."}], "lastModified": "2023-11-07T04:05:57.277", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ic3000_industrial_compute_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0123C40-42E9-4DA1-A333-1249D52FE05F", "versionEndExcluding": "1.4.2"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:iox:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41E74F18-C63E-4A10-99C2-51907E199BC0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F708D7F-6673-489E-9B2D-796AF552D7A2", "versionEndExcluding": "17.6.5"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9FC38B1-5F12-496F-8843-F119DB2D684C", "versionEndExcluding": "17.9.2", "versionStartIncluding": "17.9.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.10.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC868609-83CD-4FBA-A842-18CD4F07D8D4"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:cgr1240_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F343CE69-D1C6-4CB3-97CF-AC480FA6802D", "versionEndExcluding": "1.16.0.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:cgr1240:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D1FE609C-8021-48C8-AF15-F176D82A9B23"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:cgr1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F17050EB-5D47-4287-A2E7-518A811157A7", "versionEndExcluding": "1.16.0.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:cgr1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3A7C73AA-7DBA-43BD-819B-1CA5228CFB0B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ir510_wpan_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CF8D8F3-C04A-4A32-B7DF-7649506B83D1", "versionEndExcluding": "1.10.0.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ir510_wpan:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D29EAD2C-C9A3-4129-8C4F-1C0963826FA4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94A8B23B-89DC-4BD2-AC3B-E73169F42F6C", "versionEndExcluding": "15.9\\(3\\)"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0E5C422-7131-49C5-B05C-11CDC97373BC"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "313940F2-909D-4BAB-BC1C-CA9419F4E9A0"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "887AA4F7-7A63-4FAF-89E9-B992FF8C0F46"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1EEADC2-0938-48F8-8ED4-7A2643B6BAE2"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A79FD2A7-F49F-40CA-B721-AD222DD16CA6"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE95BEF3-E236-4B08-A3C5-210A094AB41E"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D097582-7C84-4899-93C4-B16692A41302"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86891B33-4B66-48C1-933B-75187404B129"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "372E3DB5-5296-4353-9A2B-0A8040F07BA3"}, {"criteria": "cpe:2.3:o:cisco:829_industrial_integrated_services_router_firmware:15.9\\(3\\)m6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20FCE500-AD08-40CE-8956-2997C9200B41"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "398D63B0-F15B-409B-AFBC-DE6C94FAF815"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FB92E03-2956-4AC1-831F-152FCBA01092", "versionEndExcluding": "15.9\\(3\\)"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FA00C2A-CFC0-498B-8EA7-989FA2B78A2A"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "308D1626-255D-4266-B2E1-B6D34D7D8881"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA3B170E-B248-4E9E-968B-A6320AAF3601"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E20439B8-530E-4C49-AFBE-5AFAC95BA994"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDA253BF-10DF-4819-A165-9E9049B14D74"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FA057DC-F9D9-4A96-9AAF-86303A4D21A4"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DF79F40-DA37-4A36-95BD-7FDD8D41783F"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0DB4FDC-3152-4144-A85B-920577D65BC5"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "564BC14B-465D-4E3D-A37A-15ED0AE65AA2"}, {"criteria": "cpe:2.3:o:cisco:807_industrial_integrated_services_router_firmware:15.9\\(3\\)m6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5612E330-FA91-4DA5-9D74-4E262769E388"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:807_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0EEA0369-B5B1-41FD-98EE-F7F4EAB9863D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF306339-36B4-4549-8C8D-C7530C575D9B", "versionEndExcluding": "15.9\\(3\\)"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA50E936-DFBC-4B6A-9AE3-763CBD2EA2CD"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8088D28-AA6B-4CA8-B120-9993D0C8035F"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73D568BB-6646-4366-8D8F-87B829AC018F"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m2a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "352566DD-EF2B-49A0-9CFF-3C67152DE403"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18E645F0-179C-43F4-9B12-2485B3C1924C"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0C1A3AB-E91B-4A59-8E49-C7E722A97F38"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m4a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5D4FD9E-A505-4819-B57D-458A24C7E0AB"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A299F13E-02DD-490E-96F7-02BF7B21A46D"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m6a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACD17542-1D24-4D1B-A123-B773BA66326E"}, {"criteria": "cpe:2.3:o:cisco:809_industrial_integrated_services_router_firmware:15.9\\(3\\)m6b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D5F1604-4189-4585-8E94-0BD1F02A125C"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EF4558F1-B87C-439F-AF8F-C19AACAB80E0"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}