CVE-2023-20102

A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:secure_network_analytics:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:stealthwatch_management_console_2200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:stealthwatch_management_console_2200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:40

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS - Vendor Advisory () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS - Vendor Advisory

Information

Published : 2023-04-05 19:15

Updated : 2024-11-21 07:40


NVD link : CVE-2023-20102

Mitre link : CVE-2023-20102

CVE.ORG link : CVE-2023-20102


JSON object : View

Products Affected

cisco

  • stealthwatch_management_console_2200
  • stealthwatch_management_console_2200_firmware
  • secure_network_analytics
CWE
CWE-502

Deserialization of Untrusted Data