CVE-2023-20009

A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]].

 The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
ciscoCNA
6.5 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 41%
VendorProductVersion
ciscoemail_security_appliance
𝑥
< 12.5.3-041
ciscoemail_security_appliance
13.0.0 ≤
𝑥
< 13.0.5-007
ciscoemail_security_appliance
13.5.0 ≤
𝑥
< 13.5.4-038
ciscoemail_security_appliance
14.0.0 ≤
𝑥
< 14.2.1-020
ciscoemail_security_appliance
14.3.0 ≤
𝑥
< 14.3.0-032
ciscosecure_email_and_web_manager
𝑥
< 12.8.1-021
ciscosecure_email_and_web_manager
13.8.0 ≤
𝑥
< 13.8.1-108
ciscosecure_email_and_web_manager
14.0.0 ≤
𝑥
< 14.2.0-224
ciscosecure_email_and_web_manager
14.3.0 ≤
𝑥
< 14.3.0-120
𝑥
= Vulnerable software versions