A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device. This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user. There are workarounds that address this vulnerability.
Published 2023-08-23 19:15:08
Updated 2024-01-25 17:15:31
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2023-20115

Probability of exploitation activity in the next 30 days EPSS Score History
~ 17 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2023-20115

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
Cisco Systems, Inc.

CWE ids for CVE-2023-20115

  • The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the product is being used. This introduces resultant weaknesses or prevents it from operating at a level of security that is desired by the administrator.
    Assigned by: ykramarz@cisco.com (Secondary)

References for CVE-2023-20115

Products affected by CVE-2023-20115

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!