First published: Tue Sep 26 2023(Updated: )
Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.
Credit: security@illumio.com security@illumio.com
Affected Software | Affected Version | How to fix |
---|---|---|
Illumio Core Policy Compute Engine | <19.3.7 | |
Illumio Core Policy Compute Engine | >=21.2.0<21.2.8 | |
Illumio Core Policy Compute Engine | >=21.5.0<21.5.36 | |
Illumio Core Policy Compute Engine | >=22.2.0<22.2.42 | |
Illumio Core Policy Compute Engine | >=22.5.0<22.5.31 | |
Illumio Core Policy Compute Engine | >=23.2.0<23.2.11 | |
<19.3.7 | ||
>=21.2.0<21.2.8 | ||
>=21.5.0<21.5.36 | ||
>=22.2.0<22.2.42 | ||
>=22.5.0<22.5.31 | ||
>=23.2.0<23.2.11 |
Upgrade to the latest release for a given major version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5183 is a vulnerability that allows for the unsafe deserialization of untrusted JSON, which can lead to the execution of arbitrary code on affected releases of the Illumio PCE.
CVE-2023-5183 has a severity rating of 8.8 (Critical).
CVE-2023-5183 affects certain versions of the Illumio Core Policy Compute Engine, specifically versions up to 19.3.7, between 21.2.0 and 21.2.8, between 21.5.0 and 21.5.36, between 22.2.0 and 22.2.42, between 22.5.0 and 22.5.31, and between 23.2.0 and 23.2.11.
With CVE-2023-5183, an attacker can leverage the vulnerability to execute arbitrary code by exploiting the network_traffic API endpoint of the Illumio PCE. However, authentication to the API is required.
To fix CVE-2023-5183, users should update their Illumio Core Policy Compute Engine to a version that is not affected by the vulnerability.