CVE-2023-20216

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:broadworks_application_delivery_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_application_server:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:broadworks_database_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_execution_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_media_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_network_database_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_network_function_manager:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:broadworks_profile_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_service_control_function_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_troubleshooting_server:*:*:*:*:release_independent:*:*:*
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:-:*:*:*
cpe:2.3:a:cisco:broadworks_xtended_services_platform:*:*:*:*:release_independent:*:*:*

History

21 Nov 2024, 07:40

Type Values Removed Values Added
References () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ - Vendor Advisory () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-priv-esc-qTgUZOsQ - Vendor Advisory
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 4.4

25 Jan 2024, 17:15

Type Values Removed Values Added
CWE CWE-269

Information

Published : 2023-08-03 22:15

Updated : 2024-11-21 07:40


NVD link : CVE-2023-20216

Mitre link : CVE-2023-20216

CVE.ORG link : CVE-2023-20216


JSON object : View

Products Affected

cisco

  • broadworks_xtended_services_platform
  • broadworks_database_server
  • broadworks_media_server
  • broadworks_application_server
  • broadworks_network_function_manager
  • broadworks_application_delivery_platform
  • broadworks_service_control_function_server
  • broadworks_network_database_server
  • broadworks_execution_server
  • broadworks_troubleshooting_server
  • broadworks_network_server
  • broadworks_profile_server
CWE
CWE-269

Improper Privilege Management

CWE-732

Incorrect Permission Assignment for Critical Resource