Cisco TelePresence CE Local Privilege Escalation via CLI Access
CVE-2023-20090 Published on November 15, 2024
Cisco TelePresence Collaboration Endpoint and RoomOS Software Privilege Escalation Vulnerability
A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Vulnerability Analysis
CVE-2023-20090 is exploitable with local system access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
Path Traversal: 'dir/../../filename'
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize multiple internal "../" sequences that can resolve to a location that is outside of that directory.
Products Associated with CVE-2023-20090
stack.watch emails you whenever new vulnerabilities are published in Cisco Telepresence Collaboration Endpoint or Cisco Roomos. Just hit a watch button to start following.
Affected Versions
Cisco RoomOS Software:- Version N/A is affected.
- Version CE9.10.2 is affected.
- Version CE9.1.4 is affected.
- Version CE9.9.3 is affected.
- Version CE9.10.3 is affected.
- Version CE9.1.5 is affected.
- Version CE9.2.4 is affected.
- Version CE9.10.1 is affected.
- Version CE9.13.0 is affected.
- Version CE9.1.2 is affected.
- Version CE9.1.1 is affected.
- Version CE9.9.4 is affected.
- Version CE9.2.1 is affected.
- Version CE9.1.3 is affected.
- Version CE9.0.1 is affected.
- Version CE9.1.6 is affected.
- Version CE9.12.4 is affected.
- Version CE9.2.2 is affected.
- Version CE9.12.3 is affected.
- Version CE9.2.3 is affected.
- Version CE9.13.1 is affected.
- Version CE9.14.3 is affected.
- Version CE9.14.4 is affected.
- Version CE9.13.2 is affected.
- Version CE9.12.5 is affected.
- Version CE9.14.5 is affected.
- Version CE9.15.0.10 is affected.
- Version CE9.15.0.11 is affected.
- Version CE9.13.3 is affected.
- Version CE9.15.0.13 is affected.
- Version CE9.14.6 is affected.
- Version CE9.15.3.17 is affected.
- Version CE9.14.7 is affected.
- Version CE9.15.0.19 is affected.
- Version CE9.15.3.19 is affected.
- Version CE9.15.3.18 is affected.
- Version CE9.15.3.22 is affected.
- Version CE9.15.8.12 is affected.
- Version CE9.15.10.8 is affected.
- Version CE9.15.3.26 is affected.
- Version CE9.15.3.25 is affected.
- Version CE9.15.13.0 is affected.
- Version CE9.15.15.4 is affected.
- Version CE9.15.16.5 is affected.
- Version 9.0.1 is affected.
- Version 9.10.1 is affected.
- Version 9.10.2 is affected.
- Version 9.10.3 is affected.
- Version 9.1.1 is affected.
- Version 9.1.2 is affected.
- Version 9.12.3 is affected.
- Version 9.12.4 is affected.
- Version 9.12.5 is affected.
- Version 9.1.3 is affected.
- Version 9.13.0 is affected.
- Version 9.13.1 is affected.
- Version 9.13.2 is affected.
- Version 9.13.3 is affected.
- Version 9.1.4 is affected.
- Version 9.14.3 is affected.
- Version 9.14.4 is affected.
- Version 9.14.5 is affected.
- Version 9.14.6 is affected.
- Version 9.1.5 is affected.
- Version 9.15.0.10 is affected.
- Version 9.15.0.11 is affected.
- Version 9.15.13.0 is affected.
- Version 9.15.8.12 is affected.
- Version 9.1.6 is affected.
- Version 9.2.1 is affected.
- Version 9.2.2 is affected.
- Version 9.2.3 is affected.
- Version 9.2.4 is affected.
- Version 9.9.3 is affected.
- Version 9.9.4 is affected.
- Version 9.15.0.19 is affected.
- Version 9.15.10.8 is affected.
- Version 9.15.13.0 is affected.
- Version 9.15.15.4 is affected.
- Version 9.15.16.5 is affected.
- Version 9.15.3.18 is affected.
- Version 9.15.3.19 is affected.
- Version 9.15.3.22 is affected.
- Version 9.15.3.25 is affected.
- Version 9.15.3.26 is affected.
- Version 9.15.8.12 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.