A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user.
References
Configurations
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealthsmc-rce-sfNBPjcS - Vendor Advisory |
Information
Published : 2023-04-05 19:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-20102
Mitre link : CVE-2023-20102
CVE.ORG link : CVE-2023-20102
JSON object : View
Products Affected
cisco
- stealthwatch_management_console_2200
- stealthwatch_management_console_2200_firmware
- secure_network_analytics
CWE
CWE-502
Deserialization of Untrusted Data