First published: Wed May 15 2024(Updated: )
A vulnerability in the Cisco Crosswork NSO CLI and the ConfD CLI could allow an authenticated, low-privileged, local attacker to elevate privileges to root on the underlying operating system. The vulnerability is due to an incorrect privilege assignment when specific CLI commands are used. An attacker could exploit this vulnerability by executing an affected CLI command. A successful exploit could allow the attacker to elevate privileges to root on the underlying operating system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Crosswork Network Services Orchestrator | ||
Cisco ConfD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20383 is classified as a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2024-20383, apply the latest patches provided by Cisco for affected products including Cisco Crosswork NSO and Cisco ConfD.
CVE-2024-20383 affects authenticated, low-privileged local users of Cisco Crosswork NSO and Cisco ConfD who can execute specific CLI commands.
CVE-2024-20383 can facilitate privilege escalation attacks, allowing low-privileged users to gain root access to the underlying operating system.
Currently, there are no known workarounds for CVE-2024-20383, so applying the recommended patches is essential.