Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cisco-sa-bw-auth-bypass-kcggmwhx
Vulnerability from csaf_cisco
Published
2023-09-06 16:00
Modified
2023-09-06 16:00
Summary
Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Authentication Bypass Vulnerability
Notes
Summary
A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.
This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerable Products
This vulnerability affects Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform if they are running a vulnerable release of Cisco BroadWorks and have one of the following applications enabled:
AuthenticationService
BWCallCenter
BWReceptionist
CustomMediaFilesRetrieval
ModeratorClientApp
PublicECLQuery
PublicReporting
UCAPI
Xsi-Actions
Xsi-Events
Xsi-MMTel
Xsi-VTR
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory.
Products Confirmed Not Vulnerable
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
BroadWorks Ansible Playbook
BroadWorks Database Server
BroadWorks Database Troubleshooting Server
BroadWorks Execution Server
BroadWorks Media Server
BroadWorks Messaging Server
BroadWorks Network Database Server
BroadWorks Network Function Manager
BroadWorks Network Server
BroadWorks Pre-Install Check
BroadWorks Profile Server
BroadWorks Service Control Function Server
BroadWorks Service License Report Tool
BroadWorks Sharing Server
BroadWorks Software Manager
BroadWorks Video Server
BroadWorks WebRTC Server
Workarounds
There are no workarounds that address this vulnerability.
Fixed Software
Cisco has released free software updates ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.
Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:
https://www.cisco.com/c/en/us/products/end-user-license-agreement.html ["https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"]
Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.
The Cisco Support and Downloads page ["https://www.cisco.com/c/en/us/support/index.html"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html ["https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"]
Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.
Fixed Releases
In the following table, the left column lists Cisco software releases. The right column indicates whether a release is affected by the vulnerability that is described in this advisory and the first release that includes the fix for this vulnerability. Customers are advised to upgrade to an appropriate fixed software release ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"] as indicated in this section.
Cisco BroadWorks Application Delivery Platform and BroadWorks Xtended Services Platform Release First Fixed Release 22.0 and earlier Migrate to a fixed release. 23.0 AP.platform.23.0.1075.ap385341 Release Independent (RI) 2023.06_1.333 and 2023.07_1.332
The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.
Vulnerability Policy
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Exploitation and Public Announcements
The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
Source
This vulnerability was found during internal security testing.
Legal Disclaimer
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found during internal security testing." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.\r\n\r\nThis vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "This vulnerability affects Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform if they are running a vulnerable release of Cisco BroadWorks and have one of the following applications enabled:\r\n\r\nAuthenticationService\r\nBWCallCenter\r\nBWReceptionist\r\nCustomMediaFilesRetrieval\r\nModeratorClientApp\r\nPublicECLQuery\r\nPublicReporting\r\nUCAPI\r\nXsi-Actions\r\nXsi-Events\r\nXsi-MMTel\r\nXsi-VTR\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect the following Cisco products:\r\n\r\nBroadWorks Ansible Playbook\r\nBroadWorks Database Server\r\nBroadWorks Database Troubleshooting Server\r\nBroadWorks Execution Server\r\nBroadWorks Media Server\r\nBroadWorks Messaging Server\r\nBroadWorks Network Database Server\r\nBroadWorks Network Function Manager\r\nBroadWorks Network Server\r\nBroadWorks Pre-Install Check\r\nBroadWorks Profile Server\r\nBroadWorks Service Control Function Server\r\nBroadWorks Service License Report Tool\r\nBroadWorks Sharing Server\r\nBroadWorks Software Manager\r\nBroadWorks Video Server\r\nBroadWorks WebRTC Server", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu\"] that address the vulnerability described in this advisory. Customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels.\r\n\r\nCustomers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nThe Cisco Support and Downloads page [\"https://www.cisco.com/c/en/us/support/index.html\"] on Cisco.com provides information about licensing and downloads. This page can also display customer device support coverage for customers who use the My Devices tool.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Fixed Releases\r\nIn the following table, the left column lists Cisco software releases. The right column indicates whether a release is affected by the vulnerability that is described in this advisory and the first release that includes the fix for this vulnerability. Customers are advised to upgrade to an appropriate fixed software release [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"] as indicated in this section.\r\n Cisco BroadWorks Application Delivery Platform and BroadWorks Xtended Services Platform Release First Fixed Release 22.0 and earlier Migrate to a fixed release. 23.0 AP.platform.23.0.1075.ap385341 Release Independent (RI) 2023.06_1.333 and 2023.07_1.332\r\nThe Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found during internal security testing.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Authentication Bypass Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "free software updates", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#ssu" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "Cisco Support and Downloads page", "url": "https://www.cisco.com/c/en/us/support/index.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html" } ], "title": "Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Authentication Bypass Vulnerability", "tracking": { "current_release_date": "2023-09-06T16:00:00+00:00", "generator": { "date": "2024-05-10T23:26:25+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-bw-auth-bypass-kCggMWhX", "initial_release_date": "2023-09-06T16:00:00+00:00", "revision_history": [ { "date": "2023-09-06T15:51:54+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_family", "name": "Cisco BroadWorks", "product": { "name": "Cisco BroadWorks ", "product_id": "CSAFPID-282087" } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20238", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCwh02758" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-282087" ] }, "release_date": "2023-09-06T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-282087" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-282087" ] } ], "title": "Cisco BroadWorks Authentication Bypass Vulnerability" } ] }
CVE-2023-20238 (GCVE-0-2023-20238)
Vulnerability from cvelistv5
Published
2023-09-06 17:08
Modified
2024-10-23 19:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.
This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco BroadWorks |
Version: 23.0 Version: 23.0 ap383785 Version: 23.0 ap382487 Version: 23.0 ap381781 Version: 23.0 ap360007 Version: 23.0 ap369295 Version: 23.0 ap366358 Version: 23.0 ap366677 Version: 23.0 ap366803 Version: 23.0 ap363128 Version: 23.0 ap369529 Version: 23.0 ap368445 Version: 23.0 ap369227 Version: 23.0 ap367332 Version: 23.0 ap369881 Version: 23.0 ap367874 Version: 23.0 ap367974 Version: 23.0 ap367998 Version: 23.0 ap372337 Version: 23.0 ap372706 Version: 23.0 ap370193 Version: 23.0 ap372389 Version: 23.0 ap372708 Version: 23.0 ap370911 Version: 23.0 ap371681 Version: 23.0 ap370952 Version: 23.0 ap371436 Version: 23.0 ap371155 Version: 23.0 ap371682 Version: 23.0 ap371775 Version: 23.0 ap375449 Version: 23.0 ap375720 Version: 23.0 ap375661 Version: 23.0 ap375097 Version: 23.0 ap373562 Version: 23.0 ap373015 Version: 23.0 ap374971 Version: 23.0 ap373034 Version: 23.0 ap374324 Version: 23.0 ap373899 Version: 23.0 ap376041 Version: 23.0 ap375003 Version: 23.0 ap373539 Version: 23.0 ap376179 Version: 23.0 ap373299 Version: 23.0 ap375908 Version: 23.0 ap373391 Version: 23.0 ap376252 Version: 23.0 ap376429 Version: 23.0 ap376410 Version: 23.0 ap376426 Version: 23.0 ap376485 Version: 23.0 ap376620 Version: 23.0 ap378025 Version: 23.0 ap376671 Version: 23.0 ap376614 Version: 23.0 ap377578 Version: 23.0 ap377516 Version: 23.0 ap377515 Version: 23.0 ap377494 Version: 23.0 ap377984 Version: 23.0 ap378863 Version: 23.0 ap378882 Version: 23.0 ap378218 Version: 23.0 ap380161 Version: 23.0 ap378257 Version: 23.0 ap379888 Version: 23.0 ap379326 Version: 23.0 ap377149 Version: 23.0 ap380446 Version: 23.0 ap380180 Version: 23.0 ap376935 Version: 23.0 ap380473 Version: 23.0 ap381091 Version: 23.0 ap380783 Version: 23.0 ap380537 Version: 23.0 ap380512 Version: 23.0 ap381072 Version: 23.0 ap381584 Version: 23.0 ap381088 Version: 23.0 ap382053 Version: 23.0 ap382253 Version: 23.0 ap382709 Version: 23.0 ap382717 Version: 23.0 ap381498 Version: 23.0 ap382992 Version: 23.0 ap383594 Version: 23.0 ap383168 Version: 23.0 ap382362 Version: 23.0 ap384431 Version: 23.0 ap384428 Version: 22.0 Version: 22.0 ap375345 Version: 22.0 ap382358 Version: 22.0 ap347741 Version: 22.0 ap377577 Version: 22.0 ap372243 Version: 22.0 ap372504 Version: 22.0 ap360116 Version: 22.0 ap368125 Version: 22.0 ap367732 Version: 22.0 ap357506 Version: 22.0 ap380486 Version: 22.0 ap379780 Version: 22.0 ap351263 Version: 22.0 ap366916 Version: 22.0 ap363363 Version: 22.0 ap374507 Version: 22.0 ap372845 Version: 22.0 ap373684 Version: 22.0 ap366898 Version: 22.0 ap368180 Version: 22.0 ap366882 Version: 22.0 ap369774 Version: 22.0 ap374269 Version: 22.0 ap365223 Version: 22.0 ap359972 Version: 22.0 ap359433 Version: 22.0 ap359991 Version: 22.0 ap358357 Version: 22.0 ap360244 Version: 22.0 ap369931 Version: 22.0 ap367874 Version: 22.0 ap376710 Version: 22.0 ap342836 Version: 22.0 ap346307 Version: 22.0 ap345032 Version: 22.0 ap354070 Version: 22.0 ap354069 Version: 22.0 ap353915 Version: 22.0 ap349201 Version: 22.0 ap350217 Version: 22.0 ap350179 Version: 22.0 ap354313 Version: 22.0 ap354098 Version: 22.0 ap353975 Version: 22.0 ap348945 Version: 22.0 ap354090 Version: 22.0 ap350573 Version: 22.0 ap352516 Version: 22.0 ap352109 Version: 22.0 ap353384 Version: 22.0 ap353490 Version: 22.0 ap352962 Version: 22.0 ap352703 Version: 22.0 ap353418 Version: 22.0 ap351700 Version: 22.0 ap352205 Version: 22.0 ap353360 Version: 22.0 ap352932 Version: 22.0 ap354921 Version: 22.0 ap352726 Version: 22.0 ap355757 Version: 22.0 ap352972 Version: 22.0 ap353577 Version: 22.0 ap356603 Version: 22.0 ap355894 Version: 22.0 ap355385 Version: 22.0 ap353311 Version: 22.0 ap355300 Version: 22.0 ap355083 Version: 22.0 ap357047 Version: 22.0 ap353681 Version: 22.0 ap356848 Version: 22.0 ap356706 Version: 22.0 ap356474 Version: 22.0 ap355091 Version: 22.0 ap354785 Version: 22.0 ap355905 Version: 22.0 ap355365 Version: 22.0 ap356359 Version: 22.0 ap356434 Version: 22.0 ap354936 Version: 22.0 ap355285 Version: 22.0 ap355674 Version: 22.0 ap355922 Version: 22.0 ap354597 Version: 22.0 ap356458 Version: 22.0 ap356140 Version: 22.0 ap354413 Version: 22.0 ap357400 Version: 22.0 ap357632 Version: 22.0 ap356390 Version: 22.0 ap357607 Version: 22.0 ap357447 Version: 22.0 ap357560 Version: 22.0 ap357645 Version: 22.0 ap357768 Version: 22.0 ap357859 Version: 22.0 ap357769 Version: 22.0 ap358469 Version: 22.0 ap359049 Version: 22.0 ap358971 Version: 22.0 ap358246 Version: 22.0 ap358234 Version: 22.0 ap359156 Version: 22.0 ap359549 Version: 22.0 ap358454 Version: 22.0 ap358563 Version: 22.0 ap360250 Version: 22.0 ap360564 Version: 22.0 ap358887 Version: 22.0 ap359470 Version: 22.0 ap359465 Version: 22.0 ap359748 Version: 22.0 ap360817 Version: 22.0 ap360201 Version: 22.0 ap361153 Version: 22.0 ap360904 Version: 22.0 ap359644 Version: 22.0 ap359765 Version: 22.0 ap360912 Version: 22.0 ap360184 Version: 22.0 ap361520 Version: 22.0 ap362771 Version: 22.0 ap361445 Version: 22.0 ap361560 Version: 22.0 ap362848 Version: 22.0 ap361559 Version: 22.0 ap361820 Version: 22.0 ap361533 Version: 22.0 ap362163 Version: 22.0 ap362001 Version: 22.0 ap362276 Version: 22.0 ap362490 Version: 22.0 ap361154 Version: 22.0 ap362799 Version: 22.0 ap363815 Version: 22.0 ap362328 Version: 22.0 ap363332 Version: 22.0 ap368026 Version: 22.0 ap363521 Version: 22.0 ap364199 Version: 22.0 ap363568 Version: 22.0 ap363759 Version: 22.0 ap363596 Version: 22.0 ap366701 Version: 22.0 ap366174 Version: 22.0 ap363729 Version: 22.0 ap363770 Version: 22.0 ap366358 Version: 22.0 ap366744 Version: 22.0 ap366180 Version: 22.0 ap366649 Version: 22.0 ap365172 Version: 22.0 ap365115 Version: 22.0 ap366656 Version: 22.0 ap364521 Version: 22.0 ap364844 Version: 22.0 ap364781 Version: 22.0 ap365146 Version: 22.0 ap364797 Version: 22.0 ap364932 Version: 22.0 ap365545 Version: 22.0 ap365800 Version: 22.0 ap365173 Version: 22.0 ap364473 Version: 22.0 ap365400 Version: 22.0 ap367396 Version: 22.0 ap365632 Version: 22.0 ap365905 Version: 22.0 ap367109 Version: 22.0 ap365449 Version: 22.0 ap365685 Version: 22.0 ap367434 Version: 22.0 ap365597 Version: 22.0 ap365801 Version: 22.0 ap365730 Version: 22.0 ap365758 Version: 22.0 ap365920 Version: 22.0 ap371313 Version: 22.0 ap367291 Version: 22.0 ap365727 Version: 22.0 ap367524 Version: 22.0 ap371587 Version: 22.0 ap367453 Version: 22.0 ap365601 Version: 22.0 ap365779 Version: 22.0 ap371871 Version: 22.0 ap371437 Version: 22.0 ap372043 Version: 22.0 ap372016 Version: 22.0 ap367367 Version: 22.0 ap372072 Version: 22.0 ap372177 Version: 22.0 ap371681 Version: 22.0 ap372354 Version: 22.0 ap371656 Version: 22.0 ap371033 Version: 22.0 ap371583 Version: 22.0 ap371911 Version: 22.0 ap371467 Version: 22.0 ap372371 Version: 22.0 ap368695 Version: 22.0 ap368913 Version: 22.0 ap368987 Version: 22.0 ap372024 Version: 22.0 ap372152 Version: 22.0 ap371961 Version: 22.0 ap369674 Version: 22.0 ap369173 Version: 22.0 ap369863 Version: 22.0 ap369641 Version: 22.0 ap368604 Version: 22.0 ap368087 Version: 22.0 ap368216 Version: 22.0 ap369934 Version: 22.0 ap368326 Version: 22.0 ap369219 Version: 22.0 ap369227 Version: 22.0 ap368422 Version: 22.0 ap369881 Version: 22.0 ap369550 Version: 22.0 ap369668 Version: 22.0 ap369571 Version: 22.0 ap372433 Version: 22.0 ap370654 Version: 22.0 ap370138 Version: 22.0 ap370615 Version: 22.0 ap372643 Version: 22.0 ap372708 Version: 22.0 ap370590 Version: 22.0 ap372390 Version: 22.0 ap372757 Version: 22.0 ap370636 Version: 22.0 ap372750 Version: 22.0 ap372706 Version: 22.0 ap370269 Version: 22.0 ap370180 Version: 22.0 ap370675 Version: 22.0 ap370737 Version: 22.0 ap370424 Version: 22.0 ap370544 Version: 22.0 ap374339 Version: 22.0 ap370459 Version: 22.0 ap370545 Version: 22.0 ap370389 Version: 22.0 ap374803 Version: 22.0 ap370358 Version: 22.0 ap373539 Version: 22.0 ap373118 Version: 22.0 ap373855 Version: 22.0 ap373820 Version: 22.0 ap373438 Version: 22.0 ap374660 Version: 22.0 ap373018 Version: 22.0 ap373954 Version: 22.0 ap374230 Version: 22.0 ap374330 Version: 22.0 ap374460 Version: 22.0 ap372956 Version: 22.0 ap373111 Version: 22.0 ap374114 Version: 22.0 ap373122 Version: 22.0 ap373108 Version: 22.0 ap374356 Version: 22.0 ap375069 Version: 22.0 ap373899 Version: 22.0 ap374971 Version: 22.0 ap375862 Version: 22.0 ap375354 Version: 22.0 ap375688 Version: 22.0 ap373046 Version: 22.0 ap373452 Version: 22.0 ap374334 Version: 22.0 ap374428 Version: 22.0 ap374596 Version: 22.0 ap372963 Version: 22.0 ap376041 Version: 22.0 ap376410 Version: 22.0 ap376298 Version: 22.0 ap372799 Version: 22.0 ap376181 Version: 22.0 ap375090 Version: 22.0 ap376416 Version: 22.0 ap373098 Version: 22.0 ap375937 Version: 22.0 ap376531 Version: 22.0 ap375465 Version: 22.0 ap376100 Version: 22.0 ap375634 Version: 22.0 ap375091 Version: 22.0 ap375018 Version: 22.0 ap375743 Version: 22.0 ap375383 Version: 22.0 ap375719 Version: 22.0 ap376614 Version: 22.0 ap376541 Version: 22.0 ap375685 Version: 22.0 ap374895 Version: 22.0 ap376429 Version: 22.0 ap379838 Version: 22.0 ap380187 Version: 22.0 ap380143 Version: 22.0 ap379972 Version: 22.0 ap380535 Version: 22.0 ap380117 Version: 22.0 ap380473 Version: 22.0 ap375924 Version: 22.0 ap379833 Version: 22.0 ap376661 Version: 22.0 ap380041 Version: 22.0 ap380391 Version: 22.0 ap379795 Version: 22.0 ap376701 Version: 22.0 ap376668 Version: 22.0 ap377384 Version: 22.0 ap377480 Version: 22.0 ap377581 Version: 22.0 ap376652 Version: 22.0 ap376620 Version: 22.0 ap378405 Version: 22.0 ap377494 Version: 22.0 ap378440 Version: 22.0 ap378581 Version: 22.0 ap377307 Version: 22.0 ap377566 Version: 22.0 ap378585 Version: 22.0 ap377149 Version: 22.0 ap378471 Version: 22.0 ap377412 Version: 22.0 ap377068 Version: 22.0 ap377757 Version: 22.0 ap378332 Version: 22.0 ap379016 Version: 22.0 ap378866 Version: 22.0 ap378079 Version: 22.0 ap378509 Version: 22.0 ap378953 Version: 22.0 ap377779 Version: 22.0 ap379008 Version: 22.0 ap379694 Version: 22.0 ap379597 Version: 22.0 ap378882 Version: 22.0 ap379389 Version: 22.0 ap379487 Version: 22.0 ap379374 Version: 22.0 ap380771 Version: 22.0 ap381594 Version: 22.0 ap381243 Version: 22.0 ap380629 Version: 22.0 ap380751 Version: 22.0 ap382158 Version: 22.0 ap378999 Version: 22.0 ap381136 Version: 22.0 ap382240 Version: 22.0 ap382362 Version: 22.0 ap382192 Version: 22.0 ap381091 Version: 22.0 ap382251 Version: 22.0 ap381732 Version: 22.0 ap381584 Version: 22.0 ap381118 Version: 22.0 ap382717 Version: 22.0 ap383569 Version: 22.0 ap382487 Version: 22.0 ap383002 Version: 22.0 ap382434 Version: 22.0 ap383170 Version: 22.0 ap383309 Version: 22.0 ap383514 Version: 22.0 ap383710 Version: 22.0 ap382977 Version: 22.0 ap382488 Version: 22.0 ap383134 Version: 22.0 ap359429 Version: 21.sp1 ap351795 Version: 21.sp1 ap348143 Version: 21.sp1 ap351216 Version: 21.sp1 ap339376 Version: 21.sp1 ap358132 Version: 21.sp1 ap355717 Version: 21.sp1 ap346074 Version: 21.sp1 ap373102 Version: 21.sp1 ap235252 Version: 21.sp1 ap242300 Version: 21.sp1 ap338964 Version: 21.sp1 ap339196 Version: 21.sp1 ap341645 Version: 21.sp1 ap341897 Version: 21.sp1 ap342461 Version: 21.sp1 ap342625 Version: 21.sp1 ap342755 Version: 21.sp1 ap342853 Version: 21.sp1 ap343352 Version: 21.sp1 ap344270 Version: 21.sp1 ap344479 Version: 21.sp1 ap344681 Version: 21.sp1 ap345054 Version: 21.sp1 ap345293 Version: 21.sp1 ap345755 Version: 21.sp1 ap348472 Version: 21.sp1 ap349222 Version: 21.sp1 ap350050 Version: 21.sp1 ap350189 Version: 21.sp1 ap351248 Version: 21.sp1 ap351295 Version: 21.sp1 ap351530 Version: 21.sp1 ap351754 Version: 21.sp1 ap351898 Version: 21.sp1 ap352082 Version: 21.sp1 ap352205 Version: 21.sp1 ap352972 Version: 21.sp1 ap353418 Version: 21.sp1 ap353841 Version: 21.sp1 ap354707 Version: 21.sp1 ap356271 Version: 21.sp1 ap356787 Version: 21.sp1 ap357574 Version: 21.sp1 ap358730 Version: 21.sp1 ap360211 Version: 21.sp1 ap360306 Version: 21.sp1 ap361420 Version: 21.sp1 ap365379 Version: 21.sp1 ap365390 Version: 21.sp1 ap366348 Version: 21.sp1 ap374822 Version: 21.sp1 ap375026 Version: 21.sp1 ap375053 Version: 21.0 ap349066 Version: 21.0 ap364358 Version: 21.0 ap362637 Version: 21.0 ap342145 Version: 21.0 ap357571 Version: 21.0 ap362825 Version: 21.0 ap361559 Version: 21.0 ap339395 Version: 21.0 ap348945 Version: 21.0 ap346902 Version: 21.0 ap350308 Version: 21.0 ap363301 Version: 21.0 ap349850 Version: 21.0 ap344752 Version: 21.0 ap347640 Version: 21.0 ap350111 Version: 21.0 ap355616 Version: 21.0 ap353841 Version: 21.0 ap346128 Version: 21.0 ap350204 Version: 21.0 ap341897 Version: 21.0 ap347064 Version: 21.0 ap350032 Version: 21.0 ap351261 Version: 21.0 ap352182 Version: 21.0 ap350760 Version: 21.0 ap363408 Version: 21.sp1 ap340545 Version: 21.sp1 ap341683 Version: 21.sp1 ap341909 Version: 21.sp1 ap342214 Version: 21.sp1 ap344301 Version: 21.sp1 ap344783 Version: 21.sp1 ap346270 Version: 21.sp1 ap346351 Version: 21.sp1 ap347928 Version: 21.sp1 ap349517 Version: 21.sp1 ap349090 Version: 21.sp1 ap351315 Version: 21.sp1 ap352304 Version: 21.sp1 ap351738 Version: 21.sp1 ap354194 Version: 21.sp1 ap357347 Version: 21.sp1 ap364778 Version: 21.sp1 ap372422 Version: 21.sp1 ap371281 Version: 21.sp1 ap370908 Version: 21.sp1 ap379493 Version: 21.sp1 ap380506 Version: 21.sp9 ap360116 Version: 21.sp9 ap367207 Version: RI.2021.02 Version: RI.2021.08 Version: RI.2021.09 Version: RI.2021.10 Version: RI.2021.11 Version: RI.2021.12 Version: RI.2022.02 Version: RI.2022.03 Version: RI.2022.04 Version: RI.2022.07 Version: RI.2022.06 Version: RI.2022.05 Version: RI.2022.08 Version: RI.2022.09 Version: RI.2022.10 Version: RI.2022.12 Version: RI.2023.01 Version: RI.2023.03 Version: RI.2023.02 Version: RI.2023.04 Version: RI.2023.05 Version: RI.2023.07 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-bw-auth-bypass-kCggMWhX", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20238", "options": [ { "Exploitation": "None" }, { "Automatable": "Yes" }, { "Technical Impact": "Total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-15T16:38:47.577160Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T19:41:58.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco BroadWorks", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "23.0" }, { "status": "affected", "version": "23.0 ap383785" }, { "status": "affected", "version": "23.0 ap382487" }, { "status": "affected", "version": "23.0 ap381781" }, { "status": "affected", "version": "23.0 ap360007" }, { "status": "affected", "version": "23.0 ap369295" }, { "status": "affected", "version": "23.0 ap366358" }, { "status": "affected", "version": "23.0 ap366677" }, { "status": "affected", "version": "23.0 ap366803" }, { "status": "affected", "version": "23.0 ap363128" }, { "status": "affected", "version": "23.0 ap369529" }, { "status": "affected", "version": "23.0 ap368445" }, { "status": "affected", "version": "23.0 ap369227" }, { "status": "affected", "version": "23.0 ap367332" }, { "status": "affected", "version": "23.0 ap369881" }, { "status": "affected", "version": "23.0 ap367874" }, { "status": "affected", "version": "23.0 ap367974" }, { "status": "affected", "version": "23.0 ap367998" }, { "status": "affected", "version": "23.0 ap372337" }, { "status": "affected", "version": "23.0 ap372706" }, { "status": "affected", "version": "23.0 ap370193" }, { "status": "affected", "version": "23.0 ap372389" }, { "status": "affected", "version": "23.0 ap372708" }, { "status": "affected", "version": "23.0 ap370911" }, { "status": "affected", "version": "23.0 ap371681" }, { "status": "affected", "version": "23.0 ap370952" }, { "status": "affected", "version": "23.0 ap371436" }, { "status": "affected", "version": "23.0 ap371155" }, { "status": "affected", "version": "23.0 ap371682" }, { "status": "affected", "version": "23.0 ap371775" }, { "status": "affected", "version": "23.0 ap375449" }, { "status": "affected", "version": "23.0 ap375720" }, { "status": "affected", "version": "23.0 ap375661" }, { "status": "affected", "version": "23.0 ap375097" }, { "status": "affected", "version": "23.0 ap373562" }, { "status": "affected", "version": "23.0 ap373015" }, { "status": "affected", "version": "23.0 ap374971" }, { "status": "affected", "version": "23.0 ap373034" }, { "status": "affected", "version": "23.0 ap374324" }, { "status": "affected", "version": "23.0 ap373899" }, { "status": "affected", "version": "23.0 ap376041" }, { "status": "affected", "version": "23.0 ap375003" }, { "status": "affected", "version": "23.0 ap373539" }, { "status": "affected", "version": "23.0 ap376179" }, { "status": "affected", "version": "23.0 ap373299" }, { "status": "affected", "version": "23.0 ap375908" }, { "status": "affected", "version": "23.0 ap373391" }, { "status": "affected", "version": "23.0 ap376252" }, { "status": "affected", "version": "23.0 ap376429" }, { "status": "affected", "version": "23.0 ap376410" }, { "status": "affected", "version": "23.0 ap376426" }, { "status": "affected", "version": "23.0 ap376485" }, { "status": "affected", "version": "23.0 ap376620" }, { "status": "affected", "version": "23.0 ap378025" }, { "status": "affected", "version": "23.0 ap376671" }, { "status": "affected", "version": "23.0 ap376614" }, { "status": "affected", "version": "23.0 ap377578" }, { "status": "affected", "version": "23.0 ap377516" }, { "status": "affected", "version": "23.0 ap377515" }, { "status": "affected", "version": "23.0 ap377494" }, { "status": "affected", "version": "23.0 ap377984" }, { "status": "affected", "version": "23.0 ap378863" }, { "status": "affected", "version": "23.0 ap378882" }, { "status": "affected", "version": "23.0 ap378218" }, { "status": "affected", "version": "23.0 ap380161" }, { "status": "affected", "version": "23.0 ap378257" }, { "status": "affected", "version": "23.0 ap379888" }, { "status": "affected", "version": "23.0 ap379326" }, { "status": "affected", "version": "23.0 ap377149" }, { "status": "affected", "version": "23.0 ap380446" }, { "status": "affected", "version": "23.0 ap380180" }, { "status": "affected", "version": "23.0 ap376935" }, { "status": "affected", "version": "23.0 ap380473" }, { "status": "affected", "version": "23.0 ap381091" }, { "status": "affected", "version": "23.0 ap380783" }, { "status": "affected", "version": "23.0 ap380537" }, { "status": "affected", "version": "23.0 ap380512" }, { "status": "affected", "version": "23.0 ap381072" }, { "status": "affected", "version": "23.0 ap381584" }, { "status": "affected", "version": "23.0 ap381088" }, { "status": "affected", "version": "23.0 ap382053" }, { "status": "affected", "version": "23.0 ap382253" }, { "status": "affected", "version": "23.0 ap382709" }, { "status": "affected", "version": "23.0 ap382717" }, { "status": "affected", "version": "23.0 ap381498" }, { "status": "affected", "version": "23.0 ap382992" }, { "status": "affected", "version": "23.0 ap383594" }, { "status": "affected", "version": "23.0 ap383168" }, { "status": "affected", "version": "23.0 ap382362" }, { "status": "affected", "version": "23.0 ap384431" }, { "status": "affected", "version": "23.0 ap384428" }, { "status": "affected", "version": "22.0" }, { "status": "affected", "version": "22.0 ap375345" }, { "status": "affected", "version": "22.0 ap382358" }, { "status": "affected", "version": "22.0 ap347741" }, { "status": "affected", "version": "22.0 ap377577" }, { "status": "affected", "version": "22.0 ap372243" }, { "status": "affected", "version": "22.0 ap372504" }, { "status": "affected", "version": "22.0 ap360116" }, { "status": "affected", "version": "22.0 ap368125" }, { "status": "affected", "version": "22.0 ap367732" }, { "status": "affected", "version": "22.0 ap357506" }, { "status": "affected", "version": "22.0 ap380486" }, { "status": "affected", "version": "22.0 ap379780" }, { "status": "affected", "version": "22.0 ap351263" }, { "status": "affected", "version": "22.0 ap366916" }, { "status": "affected", "version": "22.0 ap363363" }, { "status": "affected", "version": "22.0 ap374507" }, { "status": "affected", "version": "22.0 ap372845" }, { "status": "affected", "version": "22.0 ap373684" }, { "status": "affected", "version": "22.0 ap366898" }, { "status": "affected", "version": "22.0 ap368180" }, { "status": "affected", "version": "22.0 ap366882" }, { "status": "affected", "version": "22.0 ap369774" }, { "status": "affected", "version": "22.0 ap374269" }, { "status": "affected", "version": "22.0 ap365223" }, { "status": "affected", "version": "22.0 ap359972" }, { "status": "affected", "version": "22.0 ap359433" }, { "status": "affected", "version": "22.0 ap359991" }, { "status": "affected", "version": "22.0 ap358357" }, { "status": "affected", "version": "22.0 ap360244" }, { "status": "affected", "version": "22.0 ap369931" }, { "status": "affected", "version": "22.0 ap367874" }, { "status": "affected", "version": "22.0 ap376710" }, { "status": "affected", "version": "22.0 ap342836" }, { "status": "affected", "version": "22.0 ap346307" }, { "status": "affected", "version": "22.0 ap345032" }, { "status": "affected", "version": "22.0 ap354070" }, { "status": "affected", "version": "22.0 ap354069" }, { "status": "affected", "version": "22.0 ap353915" }, { "status": "affected", "version": "22.0 ap349201" }, { "status": "affected", "version": "22.0 ap350217" }, { "status": "affected", "version": "22.0 ap350179" }, { "status": "affected", "version": "22.0 ap354313" }, { "status": "affected", "version": "22.0 ap354098" }, { "status": "affected", "version": "22.0 ap353975" }, { "status": "affected", "version": "22.0 ap348945" }, { "status": "affected", "version": "22.0 ap354090" }, { "status": "affected", "version": "22.0 ap350573" }, { "status": "affected", "version": "22.0 ap352516" }, { "status": "affected", "version": "22.0 ap352109" }, { "status": "affected", "version": "22.0 ap353384" }, { "status": "affected", "version": "22.0 ap353490" }, { "status": "affected", "version": "22.0 ap352962" }, { "status": "affected", "version": "22.0 ap352703" }, { "status": "affected", "version": "22.0 ap353418" }, { "status": "affected", "version": "22.0 ap351700" }, { "status": "affected", "version": "22.0 ap352205" }, { "status": "affected", "version": "22.0 ap353360" }, { "status": "affected", "version": "22.0 ap352932" }, { "status": "affected", "version": "22.0 ap354921" }, { "status": "affected", "version": "22.0 ap352726" }, { "status": "affected", "version": "22.0 ap355757" }, { "status": "affected", "version": "22.0 ap352972" }, { "status": "affected", "version": "22.0 ap353577" }, { "status": "affected", "version": "22.0 ap356603" }, { "status": "affected", "version": "22.0 ap355894" }, { "status": "affected", "version": "22.0 ap355385" }, { "status": "affected", "version": "22.0 ap353311" }, { "status": "affected", "version": "22.0 ap355300" }, { "status": "affected", "version": "22.0 ap355083" }, { "status": "affected", "version": "22.0 ap357047" }, { "status": "affected", "version": "22.0 ap353681" }, { "status": "affected", "version": "22.0 ap356848" }, { "status": "affected", "version": "22.0 ap356706" }, { "status": "affected", "version": "22.0 ap356474" }, { "status": "affected", "version": "22.0 ap355091" }, { "status": "affected", "version": "22.0 ap354785" }, { "status": "affected", "version": "22.0 ap355905" }, { "status": "affected", "version": "22.0 ap355365" }, { "status": "affected", "version": "22.0 ap356359" }, { "status": "affected", "version": "22.0 ap356434" }, { "status": "affected", "version": "22.0 ap354936" }, { "status": "affected", "version": "22.0 ap355285" }, { "status": "affected", "version": "22.0 ap355674" }, { "status": "affected", "version": "22.0 ap355922" }, { "status": "affected", "version": "22.0 ap354597" }, { "status": "affected", "version": "22.0 ap356458" }, { "status": "affected", "version": "22.0 ap356140" }, { "status": "affected", "version": "22.0 ap354413" }, { "status": "affected", "version": "22.0 ap357400" }, { "status": "affected", "version": "22.0 ap357632" }, { "status": "affected", "version": "22.0 ap356390" }, { "status": "affected", "version": "22.0 ap357607" }, { "status": "affected", "version": "22.0 ap357447" }, { "status": "affected", "version": "22.0 ap357560" }, { "status": "affected", "version": "22.0 ap357645" }, { "status": "affected", "version": "22.0 ap357768" }, { "status": "affected", "version": "22.0 ap357859" }, { "status": "affected", "version": "22.0 ap357769" }, { "status": "affected", "version": "22.0 ap358469" }, { "status": "affected", "version": "22.0 ap359049" }, { "status": "affected", "version": "22.0 ap358971" }, { "status": "affected", "version": "22.0 ap358246" }, { "status": "affected", "version": "22.0 ap358234" }, { "status": "affected", "version": "22.0 ap359156" }, { "status": "affected", "version": "22.0 ap359549" }, { "status": "affected", "version": "22.0 ap358454" }, { "status": "affected", "version": "22.0 ap358563" }, { "status": "affected", "version": "22.0 ap360250" }, { "status": "affected", "version": "22.0 ap360564" }, { "status": "affected", "version": "22.0 ap358887" }, { "status": "affected", "version": "22.0 ap359470" }, { "status": "affected", "version": "22.0 ap359465" }, { "status": "affected", "version": "22.0 ap359748" }, { "status": "affected", "version": "22.0 ap360817" }, { "status": "affected", "version": "22.0 ap360201" }, { "status": "affected", "version": "22.0 ap361153" }, { "status": "affected", "version": "22.0 ap360904" }, { "status": "affected", "version": "22.0 ap359644" }, { "status": "affected", "version": "22.0 ap359765" }, { "status": "affected", "version": "22.0 ap360912" }, { "status": "affected", "version": "22.0 ap360184" }, { "status": "affected", "version": "22.0 ap361520" }, { "status": "affected", "version": "22.0 ap362771" }, { "status": "affected", "version": "22.0 ap361445" }, { "status": "affected", "version": "22.0 ap361560" }, { "status": "affected", "version": "22.0 ap362848" }, { "status": "affected", "version": "22.0 ap361559" }, { "status": "affected", "version": "22.0 ap361820" }, { "status": "affected", "version": "22.0 ap361533" }, { "status": "affected", "version": "22.0 ap362163" }, { "status": "affected", "version": "22.0 ap362001" }, { "status": "affected", "version": "22.0 ap362276" }, { "status": "affected", "version": "22.0 ap362490" }, { "status": "affected", "version": "22.0 ap361154" }, { "status": "affected", "version": "22.0 ap362799" }, { "status": "affected", "version": "22.0 ap363815" }, { "status": "affected", "version": "22.0 ap362328" }, { "status": "affected", "version": "22.0 ap363332" }, { "status": "affected", "version": "22.0 ap368026" }, { "status": "affected", "version": "22.0 ap363521" }, { "status": "affected", "version": "22.0 ap364199" }, { "status": "affected", "version": "22.0 ap363568" }, { "status": "affected", "version": "22.0 ap363759" }, { "status": "affected", "version": "22.0 ap363596" }, { "status": "affected", "version": "22.0 ap366701" }, { "status": "affected", "version": "22.0 ap366174" }, { "status": "affected", "version": "22.0 ap363729" }, { "status": "affected", "version": "22.0 ap363770" }, { "status": "affected", "version": "22.0 ap366358" }, { "status": "affected", "version": "22.0 ap366744" }, { "status": "affected", "version": "22.0 ap366180" }, { "status": "affected", "version": "22.0 ap366649" }, { "status": "affected", "version": "22.0 ap365172" }, { "status": "affected", "version": "22.0 ap365115" }, { "status": "affected", "version": "22.0 ap366656" }, { "status": "affected", "version": "22.0 ap364521" }, { "status": "affected", "version": "22.0 ap364844" }, { "status": "affected", "version": "22.0 ap364781" }, { "status": "affected", "version": "22.0 ap365146" }, { "status": "affected", "version": "22.0 ap364797" }, { "status": "affected", "version": "22.0 ap364932" }, { "status": "affected", "version": "22.0 ap365545" }, { "status": "affected", "version": "22.0 ap365800" }, { "status": "affected", "version": "22.0 ap365173" }, { "status": "affected", "version": "22.0 ap364473" }, { "status": "affected", "version": "22.0 ap365400" }, { "status": "affected", "version": "22.0 ap367396" }, { "status": "affected", "version": "22.0 ap365632" }, { "status": "affected", "version": "22.0 ap365905" }, { "status": "affected", "version": "22.0 ap367109" }, { "status": "affected", "version": "22.0 ap365449" }, { "status": "affected", "version": "22.0 ap365685" }, { "status": "affected", "version": "22.0 ap367434" }, { "status": "affected", "version": "22.0 ap365597" }, { "status": "affected", "version": "22.0 ap365801" }, { "status": "affected", "version": "22.0 ap365730" }, { "status": "affected", "version": "22.0 ap365758" }, { "status": "affected", "version": "22.0 ap365920" }, { "status": "affected", "version": "22.0 ap371313" }, { "status": "affected", "version": "22.0 ap367291" }, { "status": "affected", "version": "22.0 ap365727" }, { "status": "affected", "version": "22.0 ap367524" }, { "status": "affected", "version": "22.0 ap371587" }, { "status": "affected", "version": "22.0 ap367453" }, { "status": "affected", "version": "22.0 ap365601" }, { "status": "affected", "version": "22.0 ap365779" }, { "status": "affected", "version": "22.0 ap371871" }, { "status": "affected", "version": "22.0 ap371437" }, { "status": "affected", "version": "22.0 ap372043" }, { "status": "affected", "version": "22.0 ap372016" }, { "status": "affected", "version": "22.0 ap367367" }, { "status": "affected", "version": "22.0 ap372072" }, { "status": "affected", "version": "22.0 ap372177" }, { "status": "affected", "version": "22.0 ap371681" }, { "status": "affected", "version": "22.0 ap372354" }, { "status": "affected", "version": "22.0 ap371656" }, { "status": "affected", "version": "22.0 ap371033" }, { "status": "affected", "version": "22.0 ap371583" }, { "status": "affected", "version": "22.0 ap371911" }, { "status": "affected", "version": "22.0 ap371467" }, { "status": "affected", "version": "22.0 ap372371" }, { "status": "affected", "version": "22.0 ap368695" }, { "status": "affected", "version": "22.0 ap368913" }, { "status": "affected", "version": "22.0 ap368987" }, { "status": "affected", "version": "22.0 ap372024" }, { "status": "affected", "version": "22.0 ap372152" }, { "status": "affected", "version": "22.0 ap371961" }, { "status": "affected", "version": "22.0 ap369674" }, { "status": "affected", "version": "22.0 ap369173" }, { "status": "affected", "version": "22.0 ap369863" }, { "status": "affected", "version": "22.0 ap369641" }, { "status": "affected", "version": "22.0 ap368604" }, { "status": "affected", "version": "22.0 ap368087" }, { "status": "affected", "version": "22.0 ap368216" }, { "status": "affected", "version": "22.0 ap369934" }, { "status": "affected", "version": "22.0 ap368326" }, { "status": "affected", "version": "22.0 ap369219" }, { "status": "affected", "version": "22.0 ap369227" }, { "status": "affected", "version": "22.0 ap368422" }, { "status": "affected", "version": "22.0 ap369881" }, { "status": "affected", "version": "22.0 ap369550" }, { "status": "affected", "version": "22.0 ap369668" }, { "status": "affected", "version": "22.0 ap369571" }, { "status": "affected", "version": "22.0 ap372433" }, { "status": "affected", "version": "22.0 ap370654" }, { "status": "affected", "version": "22.0 ap370138" }, { "status": "affected", "version": "22.0 ap370615" }, { "status": "affected", "version": "22.0 ap372643" }, { "status": "affected", "version": "22.0 ap372708" }, { "status": "affected", "version": "22.0 ap370590" }, { "status": "affected", "version": "22.0 ap372390" }, { "status": "affected", "version": "22.0 ap372757" }, { "status": "affected", "version": "22.0 ap370636" }, { "status": "affected", "version": "22.0 ap372750" }, { "status": "affected", "version": "22.0 ap372706" }, { "status": "affected", "version": "22.0 ap370269" }, { "status": "affected", "version": "22.0 ap370180" }, { "status": "affected", "version": "22.0 ap370675" }, { "status": "affected", "version": "22.0 ap370737" }, { "status": "affected", "version": "22.0 ap370424" }, { "status": "affected", "version": "22.0 ap370544" }, { "status": "affected", "version": "22.0 ap374339" }, { "status": "affected", "version": "22.0 ap370459" }, { "status": "affected", "version": "22.0 ap370545" }, { "status": "affected", "version": "22.0 ap370389" }, { "status": "affected", "version": "22.0 ap374803" }, { "status": "affected", "version": "22.0 ap370358" }, { "status": "affected", "version": "22.0 ap373539" }, { "status": "affected", "version": "22.0 ap373118" }, { "status": "affected", "version": "22.0 ap373855" }, { "status": "affected", "version": "22.0 ap373820" }, { "status": "affected", "version": "22.0 ap373438" }, { "status": "affected", "version": "22.0 ap374660" }, { "status": "affected", "version": "22.0 ap373018" }, { "status": "affected", "version": "22.0 ap373954" }, { "status": "affected", "version": "22.0 ap374230" }, { "status": "affected", "version": "22.0 ap374330" }, { "status": "affected", "version": "22.0 ap374460" }, { "status": "affected", "version": "22.0 ap372956" }, { "status": "affected", "version": "22.0 ap373111" }, { "status": "affected", "version": "22.0 ap374114" }, { "status": "affected", "version": "22.0 ap373122" }, { "status": "affected", "version": "22.0 ap373108" }, { "status": "affected", "version": "22.0 ap374356" }, { "status": "affected", "version": "22.0 ap375069" }, { "status": "affected", "version": "22.0 ap373899" }, { "status": "affected", "version": "22.0 ap374971" }, { "status": "affected", "version": "22.0 ap375862" }, { "status": "affected", "version": "22.0 ap375354" }, { "status": "affected", "version": "22.0 ap375688" }, { "status": "affected", "version": "22.0 ap373046" }, { "status": "affected", "version": "22.0 ap373452" }, { "status": "affected", "version": "22.0 ap374334" }, { "status": "affected", "version": "22.0 ap374428" }, { "status": "affected", "version": "22.0 ap374596" }, { "status": "affected", "version": "22.0 ap372963" }, { "status": "affected", "version": "22.0 ap376041" }, { "status": "affected", "version": "22.0 ap376410" }, { "status": "affected", "version": "22.0 ap376298" }, { "status": "affected", "version": "22.0 ap372799" }, { "status": "affected", "version": "22.0 ap376181" }, { "status": "affected", "version": "22.0 ap375090" }, { "status": "affected", "version": "22.0 ap376416" }, { "status": "affected", "version": "22.0 ap373098" }, { "status": "affected", "version": "22.0 ap375937" }, { "status": "affected", "version": "22.0 ap376531" }, { "status": "affected", "version": "22.0 ap375465" }, { "status": "affected", "version": "22.0 ap376100" }, { "status": "affected", "version": "22.0 ap375634" }, { "status": "affected", "version": "22.0 ap375091" }, { "status": "affected", "version": "22.0 ap375018" }, { "status": "affected", "version": "22.0 ap375743" }, { "status": "affected", "version": "22.0 ap375383" }, { "status": "affected", "version": "22.0 ap375719" }, { "status": "affected", "version": "22.0 ap376614" }, { "status": "affected", "version": "22.0 ap376541" }, { "status": "affected", "version": "22.0 ap375685" }, { "status": "affected", "version": "22.0 ap374895" }, { "status": "affected", "version": "22.0 ap376429" }, { "status": "affected", "version": "22.0 ap379838" }, { "status": "affected", "version": "22.0 ap380187" }, { "status": "affected", "version": "22.0 ap380143" }, { "status": "affected", "version": "22.0 ap379972" }, { "status": "affected", "version": "22.0 ap380535" }, { "status": "affected", "version": "22.0 ap380117" }, { "status": "affected", "version": "22.0 ap380473" }, { "status": "affected", "version": "22.0 ap375924" }, { "status": "affected", "version": "22.0 ap379833" }, { "status": "affected", "version": "22.0 ap376661" }, { "status": "affected", "version": "22.0 ap380041" }, { "status": "affected", "version": "22.0 ap380391" }, { "status": "affected", "version": "22.0 ap379795" }, { "status": "affected", "version": "22.0 ap376701" }, { "status": "affected", "version": "22.0 ap376668" }, { "status": "affected", "version": "22.0 ap377384" }, { "status": "affected", "version": "22.0 ap377480" }, { "status": "affected", "version": "22.0 ap377581" }, { "status": "affected", "version": "22.0 ap376652" }, { "status": "affected", "version": "22.0 ap376620" }, { "status": "affected", "version": "22.0 ap378405" }, { "status": "affected", "version": "22.0 ap377494" }, { "status": "affected", "version": "22.0 ap378440" }, { "status": "affected", "version": "22.0 ap378581" }, { "status": "affected", "version": "22.0 ap377307" }, { "status": "affected", "version": "22.0 ap377566" }, { "status": "affected", "version": "22.0 ap378585" }, { "status": "affected", "version": "22.0 ap377149" }, { "status": "affected", "version": "22.0 ap378471" }, { "status": "affected", "version": "22.0 ap377412" }, { "status": "affected", "version": "22.0 ap377068" }, { "status": "affected", "version": "22.0 ap377757" }, { "status": "affected", "version": "22.0 ap378332" }, { "status": "affected", "version": "22.0 ap379016" }, { "status": "affected", "version": "22.0 ap378866" }, { "status": "affected", "version": "22.0 ap378079" }, { "status": "affected", "version": "22.0 ap378509" }, { "status": "affected", "version": "22.0 ap378953" }, { "status": "affected", "version": "22.0 ap377779" }, { "status": "affected", "version": "22.0 ap379008" }, { "status": "affected", "version": "22.0 ap379694" }, { "status": "affected", "version": "22.0 ap379597" }, { "status": "affected", "version": "22.0 ap378882" }, { "status": "affected", "version": "22.0 ap379389" }, { "status": "affected", "version": "22.0 ap379487" }, { "status": "affected", "version": "22.0 ap379374" }, { "status": "affected", "version": "22.0 ap380771" }, { "status": "affected", "version": "22.0 ap381594" }, { "status": "affected", "version": "22.0 ap381243" }, { "status": "affected", "version": "22.0 ap380629" }, { "status": "affected", "version": "22.0 ap380751" }, { "status": "affected", "version": "22.0 ap382158" }, { "status": "affected", "version": "22.0 ap378999" }, { "status": "affected", "version": "22.0 ap381136" }, { "status": "affected", "version": "22.0 ap382240" }, { "status": "affected", "version": "22.0 ap382362" }, { "status": "affected", "version": "22.0 ap382192" }, { "status": "affected", "version": "22.0 ap381091" }, { "status": "affected", "version": "22.0 ap382251" }, { "status": "affected", "version": "22.0 ap381732" }, { "status": "affected", "version": "22.0 ap381584" }, { "status": "affected", "version": "22.0 ap381118" }, { "status": "affected", "version": "22.0 ap382717" }, { "status": "affected", "version": "22.0 ap383569" }, { "status": "affected", "version": "22.0 ap382487" }, { "status": "affected", "version": "22.0 ap383002" }, { "status": "affected", "version": "22.0 ap382434" }, { "status": "affected", "version": "22.0 ap383170" }, { "status": "affected", "version": "22.0 ap383309" }, { "status": "affected", "version": "22.0 ap383514" }, { "status": "affected", "version": "22.0 ap383710" }, { "status": "affected", "version": "22.0 ap382977" }, { "status": "affected", "version": "22.0 ap382488" }, { "status": "affected", "version": "22.0 ap383134" }, { "status": "affected", "version": "22.0 ap359429" }, { "status": "affected", "version": "21.sp1 ap351795" }, { "status": "affected", "version": "21.sp1 ap348143" }, { "status": "affected", "version": "21.sp1 ap351216" }, { "status": "affected", "version": "21.sp1 ap339376" }, { "status": "affected", "version": "21.sp1 ap358132" }, { "status": "affected", "version": "21.sp1 ap355717" }, { "status": "affected", "version": "21.sp1 ap346074" }, { "status": "affected", "version": "21.sp1 ap373102" }, { "status": "affected", "version": "21.sp1 ap235252" }, { "status": "affected", "version": "21.sp1 ap242300" }, { "status": "affected", "version": "21.sp1 ap338964" }, { "status": "affected", "version": "21.sp1 ap339196" }, { "status": "affected", "version": "21.sp1 ap341645" }, { "status": "affected", "version": "21.sp1 ap341897" }, { "status": "affected", "version": "21.sp1 ap342461" }, { "status": "affected", "version": "21.sp1 ap342625" }, { "status": "affected", "version": "21.sp1 ap342755" }, { "status": "affected", "version": "21.sp1 ap342853" }, { "status": "affected", "version": "21.sp1 ap343352" }, { "status": "affected", "version": "21.sp1 ap344270" }, { "status": "affected", "version": "21.sp1 ap344479" }, { "status": "affected", "version": "21.sp1 ap344681" }, { "status": "affected", "version": "21.sp1 ap345054" }, { "status": "affected", "version": "21.sp1 ap345293" }, { "status": "affected", "version": "21.sp1 ap345755" }, { "status": "affected", "version": "21.sp1 ap348472" }, { "status": "affected", "version": "21.sp1 ap349222" }, { "status": "affected", "version": "21.sp1 ap350050" }, { "status": "affected", "version": "21.sp1 ap350189" }, { "status": "affected", "version": "21.sp1 ap351248" }, { "status": "affected", "version": "21.sp1 ap351295" }, { "status": "affected", "version": "21.sp1 ap351530" }, { "status": "affected", "version": "21.sp1 ap351754" }, { "status": "affected", "version": "21.sp1 ap351898" }, { "status": "affected", "version": "21.sp1 ap352082" }, { "status": "affected", "version": "21.sp1 ap352205" }, { "status": "affected", "version": "21.sp1 ap352972" }, { "status": "affected", "version": "21.sp1 ap353418" }, { "status": "affected", "version": "21.sp1 ap353841" }, { "status": "affected", "version": "21.sp1 ap354707" }, { "status": "affected", "version": "21.sp1 ap356271" }, { "status": "affected", "version": "21.sp1 ap356787" }, { "status": "affected", "version": "21.sp1 ap357574" }, { "status": "affected", "version": "21.sp1 ap358730" }, { "status": "affected", "version": "21.sp1 ap360211" }, { "status": "affected", "version": "21.sp1 ap360306" }, { "status": "affected", "version": "21.sp1 ap361420" }, { "status": "affected", "version": "21.sp1 ap365379" }, { "status": "affected", "version": "21.sp1 ap365390" }, { "status": "affected", "version": "21.sp1 ap366348" }, { "status": "affected", "version": "21.sp1 ap374822" }, { "status": "affected", "version": "21.sp1 ap375026" }, { "status": "affected", "version": "21.sp1 ap375053" }, { "status": "affected", "version": "21.0 ap349066" }, { "status": "affected", "version": "21.0 ap364358" }, { "status": "affected", "version": "21.0 ap362637" }, { "status": "affected", "version": "21.0 ap342145" }, { "status": "affected", "version": "21.0 ap357571" }, { "status": "affected", "version": "21.0 ap362825" }, { "status": "affected", "version": "21.0 ap361559" }, { "status": "affected", "version": "21.0 ap339395" }, { "status": "affected", "version": "21.0 ap348945" }, { "status": "affected", "version": "21.0 ap346902" }, { "status": "affected", "version": "21.0 ap350308" }, { "status": "affected", "version": "21.0 ap363301" }, { "status": "affected", "version": "21.0 ap349850" }, { "status": "affected", "version": "21.0 ap344752" }, { "status": "affected", "version": "21.0 ap347640" }, { "status": "affected", "version": "21.0 ap350111" }, { "status": "affected", "version": "21.0 ap355616" }, { "status": "affected", "version": "21.0 ap353841" }, { "status": "affected", "version": "21.0 ap346128" }, { "status": "affected", "version": "21.0 ap350204" }, { "status": "affected", "version": "21.0 ap341897" }, { "status": "affected", "version": "21.0 ap347064" }, { "status": "affected", "version": "21.0 ap350032" }, { "status": "affected", "version": "21.0 ap351261" }, { "status": "affected", "version": "21.0 ap352182" }, { "status": "affected", "version": "21.0 ap350760" }, { "status": "affected", "version": "21.0 ap363408" }, { "status": "affected", "version": "21.sp1 ap340545" }, { "status": "affected", "version": "21.sp1 ap341683" }, { "status": "affected", "version": "21.sp1 ap341909" }, { "status": "affected", "version": "21.sp1 ap342214" }, { "status": "affected", "version": "21.sp1 ap344301" }, { "status": "affected", "version": "21.sp1 ap344783" }, { "status": "affected", "version": "21.sp1 ap346270" }, { "status": "affected", "version": "21.sp1 ap346351" }, { "status": "affected", "version": "21.sp1 ap347928" }, { "status": "affected", "version": "21.sp1 ap349517" }, { "status": "affected", "version": "21.sp1 ap349090" }, { "status": "affected", "version": "21.sp1 ap351315" }, { "status": "affected", "version": "21.sp1 ap352304" }, { "status": "affected", "version": "21.sp1 ap351738" }, { "status": "affected", "version": "21.sp1 ap354194" }, { "status": "affected", "version": "21.sp1 ap357347" }, { "status": "affected", "version": "21.sp1 ap364778" }, { "status": "affected", "version": "21.sp1 ap372422" }, { "status": "affected", "version": "21.sp1 ap371281" }, { "status": "affected", "version": "21.sp1 ap370908" }, { "status": "affected", "version": "21.sp1 ap379493" }, { "status": "affected", "version": "21.sp1 ap380506" }, { "status": "affected", "version": "21.sp9 ap360116" }, { "status": "affected", "version": "21.sp9 ap367207" }, { "status": "affected", "version": "RI.2021.02" }, { "status": "affected", "version": "RI.2021.08" }, { "status": "affected", "version": "RI.2021.09" }, { "status": "affected", "version": "RI.2021.10" }, { "status": "affected", "version": "RI.2021.11" }, { "status": "affected", "version": "RI.2021.12" }, { "status": "affected", "version": "RI.2022.02" }, { "status": "affected", "version": "RI.2022.03" }, { "status": "affected", "version": "RI.2022.04" }, { "status": "affected", "version": "RI.2022.07" }, { "status": "affected", "version": "RI.2022.06" }, { "status": "affected", "version": "RI.2022.05" }, { "status": "affected", "version": "RI.2022.08" }, { "status": "affected", "version": "RI.2022.09" }, { "status": "affected", "version": "RI.2022.10" }, { "status": "affected", "version": "RI.2022.12" }, { "status": "affected", "version": "RI.2023.01" }, { "status": "affected", "version": "RI.2023.03" }, { "status": "affected", "version": "RI.2023.02" }, { "status": "affected", "version": "RI.2023.04" }, { "status": "affected", "version": "RI.2023.05" }, { "status": "affected", "version": "RI.2023.07" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the single sign-on (SSO) implementation of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to forge the credentials required to access an affected system.\r\n\r This vulnerability is due to the method used to validate SSO tokens. An attacker could exploit this vulnerability by authenticating to the application with forged credentials. A successful exploit could allow the attacker to commit toll fraud or to execute commands at the privilege level of the forged account. If that account is an Administrator account, the attacker would have the ability to view confidential information, modify customer settings, or modify settings for other users. To exploit this vulnerability, the attacker would need a valid user ID that is associated with an affected Cisco BroadWorks system." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "Improper Authentication", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:58:28.743Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-bw-auth-bypass-kCggMWhX", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-auth-bypass-kCggMWhX" } ], "source": { "advisory": "cisco-sa-bw-auth-bypass-kCggMWhX", "defects": [ "CSCwh02758" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20238", "datePublished": "2023-09-06T17:08:28.178Z", "dateReserved": "2022-10-27T18:47:50.370Z", "dateUpdated": "2024-10-23T19:41:58.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…