Vulnslist

find the latest Cisco vulnerabilities

Cisco Network Services Orchestrator Path Traversal Vulnerability

cisco-sa-nso-path-trvsl-zjBeMkZg · Medium · Published · Updated

A vulnerability in the RESTCONF and NETCONF services of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group. This vulnerability exists because user-supplied input is not properly validated when either RESTCONF or NETCONF is used to upload packages to an affected device. An attacker could exploit this vulnerability by uploading a specially crafted package file. A successful exploit could allow the attacker to write crafted files to arbitrary locations on the filesystem or delete arbitrary files from the filesystem of an affected device, resulting in a DoS condition.  Note: By default, during install, Cisco NSO will be set up to run as the root user unless the --run-as-user option is used.  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-zjBeMkZg

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2023-20040
Cisco Bug IDsCSCwb11065
CVSS ScoreBase 5.5
Base 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Network Services Orchestrator

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Network Services Orchestrator known_affected cisco_csaf CVE-2023-20040 1

Related Products

Product CVE Evidence
Cisco Network Services Orchestrator CVE-2023-20040 Cisco OpenVuln