Privilege escalation in Cisco BroadWorks



Published: 2023-07-07
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-20210
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
BroadWorks Application Server
Server applications / Other server solutions

BroadWorks Database Server
Server applications / Other server solutions

BroadWorks Execution Server
Server applications / Other server solutions

BroadWorks Messaging Server
Server applications / Other server solutions

BroadWorks Network Database Server
Server applications / Other server solutions

BroadWorks Network Function Manager
Server applications / Other server solutions

BroadWorks Network Server
Server applications / Other server solutions

BroadWorks Profile Server
Server applications / Other server solutions

BroadWorks Sharing Server
Server applications / Other server solutions

BroadWorks Video Server
Server applications / Other server solutions

BroadWorks WebRTC Server
Server applications / Other server solutions

BroadWorks Xtended Services Platform
Server applications / Other server solutions

BroadWorks Application Delivery Platform
Server applications / Other server solutions

BroadWorks Database Troubleshooting Server
Server applications / Other server solutions

BroadWorks Media Server
Server applications / Other server solutions

BroadWorks Service Control Function Server
Server applications / Other server solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU78014

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-20210

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local administrator to escalate privileges on the system.

The vulnerability exists due to insufficient input validation by the operating system CLI, which leads to security restrictions bypass and privilege escalation.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

BroadWorks Application Server: 22.0 - 24.0

BroadWorks Database Server: 22.0

BroadWorks Execution Server: 22.0

BroadWorks Messaging Server: All versions

BroadWorks Network Database Server: 22.0

BroadWorks Network Function Manager: 22.0

BroadWorks Network Server: 22.0 - 23.0

BroadWorks Profile Server: 22.0 - 23.0

BroadWorks Sharing Server: All versions

BroadWorks Video Server: All versions

BroadWorks WebRTC Server: All versions

BroadWorks Xtended Services Platform: 22.0 - 23.0

BroadWorks Application Delivery Platform: before Rel_2023.05_1.290

BroadWorks Database Troubleshooting Server: before Rel_2023.05_1.290

BroadWorks Media Server: before Rel_2023.05_1.290

BroadWorks Service Control Function Server: before Rel_2023.05_1.290

CPE2.3 External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-privesc-yw4ekrXW


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###