Vulnerability Details : CVE-2023-20230
A vulnerability in the restricted security domain implementation of Cisco Application Policy Infrastructure Controller (APIC) could allow an authenticated, remote attacker to read, modify, or delete non-tenant policies (for example, access policies) created by users associated with a different security domain on an affected system.
This vulnerability is due to improper access control when restricted security domains are used to implement multi-tenancy for policies outside the tenant boundaries. An attacker with a valid user account associated with a restricted security domain could exploit this vulnerability. A successful exploit could allow the attacker to read, modify, or delete policies created by users associated with a different security domain. Exploitation is not possible for policies under tenants that an attacker has no authorization to access.
Vulnerability category: BypassGain privilege
Products affected by CVE-2023-20230
- Cisco » Application Policy Infrastructure ControllerVersions from including (>=) 6.0 and before (<) 6.0\(3d\)cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
- Cisco » Application Policy Infrastructure ControllerVersions from including (>=) 5.2 and before (<) 5.2\(8d\)cpe:2.3:a:cisco:application_policy_infrastructure_controller:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20230
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20230
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
Cisco Systems, Inc. |
CWE ids for CVE-2023-20230
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: ykramarz@cisco.com (Secondary)
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-20230
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-uapa-F4TAShk
Cisco Application Policy Infrastructure Controller Unauthorized Policy Actions VulnerabilityVendor Advisory
Jump to