CVE-2023-20029
Summary
| CVE | CVE-2023-20029 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-03-23 17:15:00 UTC |
| Updated | 2023-11-07 04:05:00 UTC |
| Description | A vulnerability in the Meraki onboarding feature of Cisco IOS XE Software could allow an authenticated, local attacker to gain root level privileges on an affected device. This vulnerability is due to insufficient memory protection in the Meraki onboarding feature of an affected device. An attacker could exploit this vulnerability by modifying the Meraki registration parameters. A successful exploit could allow the attacker to elevate privileges to root. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Catalyst 9200 | - | All | All | All |
| Hardware | Cisco | Catalyst 9200cx | - | All | All | All |
| Hardware | Cisco | Catalyst 9200l | - | All | All | All |
| Hardware | Cisco | Catalyst 9300 | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24p-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24p-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24s-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24s-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24t-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24t-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24u-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24u-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24ux-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-24ux-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48p-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48p-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48s-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48s-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48t-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48t-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48u-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48u-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48un-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48un-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48uxm-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300-48uxm-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24p-4g-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24p-4g-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24p-4x-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24p-4x-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24t-4g-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24t-4g-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24t-4x-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-24t-4x-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48p-4g-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48p-4g-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48p-4x-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48p-4x-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48t-4g-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48t-4g-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48t-4x-a | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l-48t-4x-e | - | All | All | All |
| Hardware | Cisco | Catalyst 9300lm | - | All | All | All |
| Hardware | Cisco | Catalyst 9300l Stack | - | All | All | All |
| Hardware | Cisco | Catalyst 9300x | - | All | All | All |
| Operating System | Cisco | Ios Xe | 17.7.1 | All | All | All |
| Operating System | Cisco | Ios Xe | 17.8.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco IOS XE Software Privilege Escalation Vulnerability | CISCO | sec.cloudapps.cisco.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 317313 Cisco Internetwork Operating System (IOS) XE Software Privilege Escalation Vulnerability (cisco-sa-iosxe-priv-esc-sABD8hcU)