First published: Wed Jun 28 2023(Updated: )
A vulnerability in the OpenAPI of Cisco Secure Workload could allow an authenticated, remote attacker with the privileges of a read-only user to execute operations that should require Administrator privileges. The attacker would need valid user credentials. This vulnerability is due to improper role-based access control (RBAC) of certain OpenAPI operations. An attacker could exploit this vulnerability by issuing a crafted OpenAPI function call with valid credentials. A successful exploit could allow the attacker to execute OpenAPI operations that are reserved for the Administrator user, including the creation and deletion of user labels.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure | <3.7.1.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20136 is classified as a high severity vulnerability due to its potential for unauthorized access and privilege escalation.
To fix CVE-2023-20136, upgrade Cisco Secure Workload to version 3.7.1.40 or later.
CVE-2023-20136 affects authenticated users of Cisco Secure Workload with read-only privileges.
CVE-2023-20136 is an authentication-related vulnerability that allows privilege escalation.
The potential impacts of CVE-2023-20136 include unauthorized operations being executed by users who should have limited access.