{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-20167","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","dateUpdated":"2024-10-28T16:29:21.716Z","dateReserved":"2022-10-27T00:00:00.000Z","datePublished":"2023-05-18T00:00:00.000Z"},"containers":{"cna":{"title":"Cisco Identity Services Engine Path Traversal Vulnerabilities","datePublic":"2023-05-17T00:00:00.000Z","providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2023-05-18T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to perform path traversal attacks on the underlying operating system to either elevate privileges to root or read arbitrary files. To exploit these vulnerabilities, an attacker must have valid Administrator credentials on the affected device. For more information about these vulnerabilities, see the Details section of this advisory."}],"affected":[{"vendor":"Cisco","product":"Cisco Identity Services Engine Software","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"20230517 Cisco Identity Services Engine Path Traversal Vulnerabilities","tags":["vendor-advisory"],"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-traversal-ZTUgMYhu"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-24","cweId":"CWE-24"}]}],"source":{"advisory":"cisco-sa-ise-traversal-ZTUgMYhu","defect":[["CSCwd07350","CSCwe17953"]],"discovery":"INTERNAL"},"exploits":[{"lang":"en","value":"The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:05:35.793Z"},"title":"CVE Program Container","references":[{"name":"20230517 Cisco Identity Services Engine Path Traversal Vulnerabilities","tags":["vendor-advisory","x_transferred"],"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-traversal-ZTUgMYhu"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-28T16:18:54.944928Z","id":"CVE-2023-20167","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-28T16:29:21.716Z"}}]}}