Cisco DNA Center: API ACL Bypass Enables Data Theft
CVE-2023-20223 Published on September 27, 2023
A vulnerability in Cisco DNA Center could allow an unauthenticated, remote attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control enforcement on API requests. An attacker could exploit this vulnerability by sending a crafted API request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
Vulnerability Analysis
CVE-2023-20223 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2023-20223 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2023-20223
Want to know whenever a new CVE is published for Cisco Dna Center? stack.watch will email you.
Affected Versions
Cisco Digital Network Architecture Center (DNA Center):- Version 2.2.1.3 is affected.
- Version 2.2.3.4 is affected.
- Version 2.2.3.3 is affected.
- Version 2.2.3.5 is affected.
- Version 2.2.3.6 is affected.
- Version 2.3.3.4 is affected.
- Version 2.3.3.5 is affected.
- Version 2.3.3.6 is affected.
- Version 2.3.3.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.