Intersight Private Virtual Appliance Cisco Intersight Private Virtual Appliance

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Cisco Intersight Private Virtual Appliance.

Recent Cisco Intersight Private Virtual Appliance Security Advisories

Advisory Title Published
2023-08-16 Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities August 16, 2023

By the Year

In 2026 there have been 0 vulnerabilities in Cisco Intersight Private Virtual Appliance. Intersight Private Virtual Appliance did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 2 9.10

It may take a day or so for new Intersight Private Virtual Appliance vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Cisco Intersight Private Virtual Appliance Security Vulnerabilities

Cisco Intersight Private Virtual Appliance RootLevel Command Exec via Upload
CVE-2023-20017 9.1 - Critical - August 16, 2023

Multiple vulnerabilities in Cisco Intersight Private Virtual Appliance could allow an authenticated, remote attacker to execute arbitrary commands using root-level privileges. The attacker would need to have Administrator privileges on the affected device to exploit these vulnerabilities. These vulnerabilities are due to insufficient input validation when extracting uploaded software packages. An attacker could exploit these vulnerabilities by authenticating to an affected device and uploading a crafted software package. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.

Command Injection

Cisco Intersight Private Virtual Apl: Authenticated RCE via Uploaded PKG
CVE-2023-20013 9.1 - Critical - August 16, 2023

Multiple vulnerabilities in Cisco Intersight Private Virtual Appliance could allow an authenticated, remote attacker to execute arbitrary commands using root-level privileges. The attacker would need to have Administrator privileges on the affected device to exploit these vulnerabilities. These vulnerabilities are due to insufficient input validation when extracting uploaded software packages. An attacker could exploit these vulnerabilities by authenticating to an affected device and uploading a crafted software package. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Cisco Intersight Private Virtual Appliance or by Cisco? Click the Watch button to subscribe.

Cisco
Vendor

subscribe