{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-20024","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","dateUpdated":"2024-10-28T16:08:03.183Z","dateReserved":"2022-10-27T00:00:00.000Z","datePublished":"2023-05-18T00:00:00.000Z"},"containers":{"cna":{"title":"Cisco Small Business Series Switches Buffer Overflow Vulnerabilities","datePublic":"2023-05-17T00:00:00.000Z","providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2023-05-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory."}],"affected":[{"vendor":"Cisco","product":"Cisco Small Business Smart and Managed Switches","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"20230517 Cisco Small Business Series Switches Buffer Overflow Vulnerabilities","tags":["vendor-advisory"],"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":8.6,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120","cweId":"CWE-120"}]}],"source":{"advisory":"cisco-sa-sg-web-multi-S9g4Nkgv","defect":[["CSCwe27386","CSCwe27393","CSCwe27394","CSCwe27403","CSCwe27424","CSCwe27425","CSCwe27441","CSCwe27444","CSCwe27445","CSCwe32312","CSCwe32313","CSCwe32315","CSCwe32318","CSCwe32321","CSCwe32323","CSCwe32326","CSCwe32334","CSCwe32338"]],"discovery":"INTERNAL"},"exploits":[{"lang":"en","value":"The Cisco PSIRT is aware that proof-of-concept exploit code is available for the vulnerabilities that are described in this advisory."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:57:35.540Z"},"title":"CVE Program Container","references":[{"name":"20230517 Cisco Small Business Series Switches Buffer Overflow Vulnerabilities","tags":["vendor-advisory","x_transferred"],"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sg-web-multi-S9g4Nkgv"}]},{"affected":[{"vendor":"cisco","product":"250_series_smart_switches_firmware","cpes":["cpe:2.3:o:cisco:250_series_smart_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.5.9.16","versionType":"custom"}]},{"vendor":"cisco","product":"350_series_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:350_series_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"affected","versions":[{"version":"0","status":"affected","lessThan":"2.5.9.16","versionType":"custom"}]},{"vendor":"cisco","product":"350x_series_stackable_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:350x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"affected","versions":[{"version":"0","status":"affected","lessThan":"2.5.9.16","versionType":"custom"}]},{"vendor":"cisco","product":"550x_series_stackable_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:550x_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"2.5.9.16","versionType":"custom"}]},{"vendor":"cisco","product":"business_250_series_smart_switches_firmware","cpes":["cpe:2.3:o:cisco:business_250_series_smart_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.3.0.16","versionType":"custom"}]},{"vendor":"cisco","product":"business_350_series_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:business_350_series_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"3.3.0.16","versionType":"custom"}]},{"vendor":"cisco","product":"small_business_200_series_smart_switches_firmware","cpes":["cpe:2.3:o:cisco:small_business_200_series_smart_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"cisco","product":"small_business_300_series_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:small_business_300_series_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]},{"vendor":"cisco","product":"small_business_500_series_stackable_managed_switches_firmware","cpes":["cpe:2.3:o:cisco:small_business_500_series_stackable_managed_switches_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"*","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-28T16:06:32.323027Z","id":"CVE-2023-20024","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-28T16:08:03.183Z"}}]}}