CVE-2023-20103

A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:secure_network_analytics:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : 4.9
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-BDwXFK9C - Vendor Advisory () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-stealth-rce-BDwXFK9C - Vendor Advisory

Information

Published : 2023-04-05 19:15

Updated : 2024-11-21 07:40


NVD link : CVE-2023-20103

Mitre link : CVE-2023-20103

CVE.ORG link : CVE-2023-20103


JSON object : View

Products Affected

cisco

  • secure_network_analytics
CWE
CWE-20

Improper Input Validation