Vulnerability Details : CVE-2023-20048
Public exploit exists!
A vulnerability in the web services interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute certain unauthorized configuration commands on a Firepower Threat Defense (FTD) device that is managed by the FMC Software. This vulnerability is due to insufficient authorization of configuration commands that are sent through the web service interface. An attacker could exploit this vulnerability by authenticating to the FMC web services interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute certain configuration commands on the targeted FTD device. To successfully exploit this vulnerability, an attacker would need valid credentials on the FMC Software.
Products affected by CVE-2023-20048
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.2.3 and up to, including, (<=) 6.2.3.18cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.1.0 and up to, including, (<=) 7.1.0.3cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.7.0 and up to, including, (<=) 6.7.0.3cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.4.0 and up to, including, (<=) 6.4.0.16cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.0.0 and up to, including, (<=) 7.0.5cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 6.6.0 and up to, including, (<=) 6.6.7.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.3.0 and up to, including, (<=) 7.3.1.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
- Cisco » Secure Firewall Management CenterVersions from including (>=) 7.2.0 and up to, including, (<=) 7.2.3.1cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20048
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20048
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
3.1
|
6.0
|
NIST | |
9.9
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:H |
3.1
|
6.0
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20048
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: ykramarz@cisco.com (Secondary)
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-20048
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN
Cisco Firepower Management Center Software Command Injection VulnerabilityVendor Advisory
Jump to