Vulnerabilites related to cisco - appdynamics
Vulnerability from fkie_nvd
Published
2024-05-15 18:15
Modified
2025-08-04 14:21
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in Cisco AppDynamics Network Visibility Agent could allow an unauthenticated, local attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to the inability to handle unexpected input. An attacker who has local device access could exploit this vulnerability by sending an HTTP request to the targeted service. A successful exploit could allow the attacker to cause a DoS condition by stopping the Network Agent Service on the local device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | appdynamics | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:appdynamics:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9D8C39A-B63F-483D-8850-4FE594A2CBD9", "versionEndExcluding": "24.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco AppDynamics Network Visibility Agent could allow an unauthenticated, local attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to the inability to handle unexpected input. An attacker who has local device access could exploit this vulnerability by sending an HTTP request to the targeted service. A successful exploit could allow the attacker to cause a DoS condition by stopping the Network Agent Service on the local device." }, { "lang": "es", "value": "Una vulnerabilidad en Cisco AppDynamics Network Visibility Agent podr\u00eda permitir que un atacante local no autenticado provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a la incapacidad de manejar entradas inesperadas. Un atacante que tenga acceso a un dispositivo local podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP al servicio objetivo. Un exploit exitoso podr\u00eda permitir al atacante provocar una condici\u00f3n DoS al detener el servicio del Agente de red en el dispositivo local." } ], "id": "CVE-2024-20394", "lastModified": "2025-08-04T14:21:30.953", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T18:15:10.620", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-21 19:15
Modified
2024-11-21 07:41
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | appdynamics | 21.2.7 | |
cisco | appdynamics | 21.2.8 | |
cisco | appdynamics | 21.4.0 | |
cisco | appdynamics | 21.4.2 | |
cisco | appdynamics | 21.4.3 | |
cisco | appdynamics | 21.4.4 | |
cisco | appdynamics | 21.4.5 | |
cisco | appdynamics | 21.4.6 | |
cisco | appdynamics | 21.4.7 | |
cisco | appdynamics | 21.4.8 | |
cisco | appdynamics | 21.4.9 | |
cisco | appdynamics | 21.4.10 | |
cisco | appdynamics | 21.4.11 | |
cisco | appdynamics | 21.5.0 | |
cisco | appdynamics | 21.6.0 | |
cisco | appdynamics | 21.7.0 | |
cisco | appdynamics | 22.1.0 | |
cisco | appdynamics | 22.1.1 | |
cisco | appdynamics | 22.3.0 | |
cisco | appdynamics | 22.8.0 | |
cisco | appdynamics | 22.10.0 | |
cisco | appdynamics | 22.11.0 | |
cisco | appdynamics | 22.12.0 | |
cisco | appdynamics | 22.12.1 | |
cisco | appdynamics | 23.2.0 | |
cisco | appdynamics | 23.4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:appdynamics:21.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "5EF2D254-0CF2-4222-8A0F-287FEC8076EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "99B37EFD-038D-4EDF-94B0-B71CCFADEFEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DD05623-01FA-4D93-B296-2350AB454440", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "30CF7CE2-79AE-439D-B8BC-CFFEDBA31722", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "E95BBC50-C9C1-46B6-B2DB-648E0D13F9FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "36E10113-C233-4894-9275-A428A862603A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "F2410CD6-EBBE-4293-8520-8458BC48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "115F3303-40E2-49DC-B258-EEAA7FD25FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "8B4CEE68-78AA-4D7C-85FD-F2CC8029F35B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "F5372D69-BA7B-4717-A114-B932B42E59A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "340C12A6-C074-4D37-AADC-DF6BA1F80E9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "AAC949D5-B682-4543-96D9-6A3F315722CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "E690D089-6743-4A53-AF37-F8F145A535AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8AA69ED-46A8-44A0-B2BF-1E87DE16D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "981D0B03-F48D-4171-A47C-C14F8477AC93", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:21.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "340F13D8-A7CE-4B4E-911C-AF09B904841B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "05D3B1C5-6BD5-4216-BA52-B318EA090164", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3789CA6-7074-4BA5-B299-2A37B42CC0D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "090629EC-7BBA-4AD7-9273-03CA44213CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "58162F8D-25CC-4568-9E08-8D33F80D1C05", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE76C4DC-1154-4851-AD29-0655F916F20A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "82ED4CB3-83EB-49B1-AEED-7835C0B9546A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "D67688D6-2436-4AA2-B3DB-4F04591A3294", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:22.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "16B0356D-D0F9-4B5F-86F5-A0A197720725", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:23.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5B21D424-2EFF-403F-A66D-1A0BFC2DC915", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:appdynamics:23.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9500E08E-CB71-42BD-81AB-90FA2BC9D005", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device." }, { "lang": "es", "value": "Una vulnerabilidad en el script de instalaci\u00f3n de Cisco AppDynamics PHP Agent podr\u00eda permitir que un atacante local autenticado eleve los privilegios en un dispositivo afectado. Esta vulnerabilidad se debe a permisos insuficientes establecidos por el instalador del Agente PHP en el directorio de instalaci\u00f3n del Agente PHP. Un atacante podr\u00eda aprovechar esta vulnerabilidad modificando objetos en el directorio de instalaci\u00f3n del Agente PHP, que se ejecutar\u00eda con los mismos privilegios que PHP. Un exploit exitoso podr\u00eda permitir a un atacante con pocos privilegios elevar sus privilegios a root en un dispositivo afectado." } ], "id": "CVE-2023-20274", "lastModified": "2024-11-21T07:41:03.290", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-21T19:15:09.087", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
CVE-2024-20394 (GCVE-0-2024-20394)
Vulnerability from cvelistv5
Published
2024-05-15 17:21
Modified
2024-08-09 18:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A vulnerability in Cisco AppDynamics Network Visibility Agent could allow an unauthenticated, local attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to the inability to handle unexpected input. An attacker who has local device access could exploit this vulnerability by sending an HTTP request to the targeted service. A successful exploit could allow the attacker to cause a DoS condition by stopping the Network Agent Service on the local device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco AppDynamics |
Version: N/A |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-appd-netvisdos-9zNbsJtK", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-20394", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:33:17.627981Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T18:33:27.091Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco AppDynamics", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco AppDynamics Network Visibility Agent could allow an unauthenticated, local attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to the inability to handle unexpected input. An attacker who has local device access could exploit this vulnerability by sending an HTTP request to the targeted service. A successful exploit could allow the attacker to cause a DoS condition by stopping the Network Agent Service on the local device." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T17:21:46.986Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-appd-netvisdos-9zNbsJtK", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-netvisdos-9zNbsJtK" } ], "source": { "advisory": "cisco-sa-appd-netvisdos-9zNbsJtK", "defects": [ "CSCwh65251" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20394", "datePublished": "2024-05-15T17:21:46.986Z", "dateReserved": "2023-11-08T15:08:07.659Z", "dateUpdated": "2024-08-09T18:33:27.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20274 (GCVE-0-2023-20274)
Vulnerability from cvelistv5
Published
2023-11-21 18:49
Modified
2024-08-29 20:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco AppDynamics |
Version: 21.2.7 Version: 21.2.8 Version: 21.4.0 Version: 21.4.10 Version: 21.4.11 Version: 21.4.2 Version: 21.4.3 Version: 21.4.4 Version: 21.4.5 Version: 21.4.6 Version: 21.4.7 Version: 21.4.8 Version: 21.4.9 Version: 21.5.0 Version: 21.6.0 Version: 22.1.0 Version: 22.1.1 Version: 22.11.0 Version: 22.3.0 Version: 22.10.0 Version: 22.12.0 Version: 22.12.1 Version: 21.7.0 Version: 22.8.0 Version: 23.2.0 Version: 23.4.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-appd-php-authpriv-gEBwTvu5", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20274", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-21T19:47:48.993316Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T20:01:10.301Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco AppDynamics", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "21.2.7" }, { "status": "affected", "version": "21.2.8" }, { "status": "affected", "version": "21.4.0" }, { "status": "affected", "version": "21.4.10" }, { "status": "affected", "version": "21.4.11" }, { "status": "affected", "version": "21.4.2" }, { "status": "affected", "version": "21.4.3" }, { "status": "affected", "version": "21.4.4" }, { "status": "affected", "version": "21.4.5" }, { "status": "affected", "version": "21.4.6" }, { "status": "affected", "version": "21.4.7" }, { "status": "affected", "version": "21.4.8" }, { "status": "affected", "version": "21.4.9" }, { "status": "affected", "version": "21.5.0" }, { "status": "affected", "version": "21.6.0" }, { "status": "affected", "version": "22.1.0" }, { "status": "affected", "version": "22.1.1" }, { "status": "affected", "version": "22.11.0" }, { "status": "affected", "version": "22.3.0" }, { "status": "affected", "version": "22.10.0" }, { "status": "affected", "version": "22.12.0" }, { "status": "affected", "version": "22.12.1" }, { "status": "affected", "version": "21.7.0" }, { "status": "affected", "version": "22.8.0" }, { "status": "affected", "version": "23.2.0" }, { "status": "affected", "version": "23.4.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.\r\n\r This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "Improper Privilege Management", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:38.138Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-appd-php-authpriv-gEBwTvu5", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5" } ], "source": { "advisory": "cisco-sa-appd-php-authpriv-gEBwTvu5", "defects": [ "CSCwh65119" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20274", "datePublished": "2023-11-21T18:49:52.044Z", "dateReserved": "2022-10-27T18:47:50.374Z", "dateUpdated": "2024-08-29T20:01:10.301Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }