Show plain JSON{"id": "CVE-2023-20029", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 4.4, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 0.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2023-03-23T17:15:13.940", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-sABD8hcU", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-priv-esc-sABD8hcU", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-122"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root."}], "lastModified": "2024-11-21T07:40:23.523", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7670A322-31C2-4A8A-86E9-09D63C52E4C2"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0972076B-5C87-44B3-90EC-4C200B89318A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74AED057-2458-4DE0-8D51-ABD766D07F68"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "19538C03-5FB8-4401-8B21-489C629D7E7D"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B26D7061-F471-4DF0-A892-ED132958B84A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "033ED443-80E7-4012-9825-07AAC0D44B96"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD3F3CC6-A349-47B1-B282-B6458683C191"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CB24EF21-1C10-48A7-BC68-FFC842A28D12"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ED0625A2-BF14-4552-83D8-AEE0A04EA023"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21AFDC0D-7629-424E-827B-C8A8767324C3"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A263CFF2-A659-405B-90EA-51E49B25C6D3"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CEFBD449-217D-4569-99F7-D56B853A3E07"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7ED668FC-D1A5-4175-A234-23760BA6E788"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D650C48-9241-42F7-87A9-20733329489A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3ED16A65-9AFF-4825-95D1-162FBA0F566D"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "82D345E7-8208-41AC-B11A-4425D29E98A1"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E386D461-F1C1-4970-B056-D6119E74D449"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99F3A466-F665-4132-ABC4-2DFC0A7E2B55"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B3395168-FF2E-4CB6-AABE-5E36DEB241CA"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "226F985C-4669-4D0A-9DB4-CB1465B37B02"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B736A43-6F4E-40A9-84E4-D9E251489234"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E99CA124-7D86-463B-A31E-A7836B7493E6"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E014B028-8DD9-428C-B705-8F428F145932"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A6C44229-A842-49B2-AD3E-79C83DB63EBE"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5306E847-C718-4C83-9C97-8AB498DC4A88"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "18287CEF-B574-4498-A256-567CA6E6CA7C"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1E9AAA2C-495E-4FD1-9050-264FDC25254B"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5713043E-2535-4540-B3EF-41FAC40BECE9"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67701D77-8B03-446A-AE22-4B8CCCD6F029"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "831A2390-7170-4FC0-A95E-3DAB1791017D"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F788CBC4-782F-4A43-AC80-4AEF1C43A22D"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "493989DC-8F1B-45C9-AD11-38B97B958C9C"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F168FB20-0C44-4A5B-910A-04B9517545C2"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}