First published: Thu Aug 03 2023(Updated: )
A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system. This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system. A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions. There are workarounds that address this vulnerability.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco BroadWorks Application Delivery Platform | <ri.2023.05 | |
Cisco BroadWorks Application Server | <23.0.2023.05 | |
Cisco BroadWorks Application Server | <2023.05 | |
Cisco BroadWorks Application Server | >=24.0<24.0.2023.05 | |
Cisco Broadworks Database Server | <2023.05 | |
Cisco Broadworks Execution Server | <2023.05 | |
Cisco Broadworks Media Server | <2023.05 | |
Cisco Broadworks Network Database Server | <2023.05 | |
Cisco Broadworks Network Function Manager | <2023.05 | |
Cisco Broadworks Network Server | <23.0.2023.05 | |
Cisco Broadworks Network Server | <2023.05 | |
Cisco Broadworks Profile Server | <23.0.2023.05 | |
Cisco Broadworks Profile Server | <2023.05 | |
Cisco Broadworks Service Control Function Server | <2023.05 | |
Cisco Broadworks Troubleshooting Server | <2023.06 | |
Cisco BroadWorks Xtended Services Platform | <23.0.2023.05 | |
Cisco BroadWorks Xtended Services Platform | <2023.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.