// For flags

CVE-2020-3443

Cisco Smart Software Manager On-Prem Privilege Escalation Vulnerability

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an authenticated, remote attacker to elevate privileges and execute commands with higher privileges. The vulnerability is due to insufficient authorization of the System Operator role capabilities. An attacker could exploit this vulnerability by logging in with the System Operator role, performing a series of actions, and then assuming a new higher privileged role. A successful exploit could allow the attacker to perform all actions associated with the privilege of the assumed role. If that role is an administrative role, the attacker would gain full access to the device.

Una vulnerabilidad en Cisco Smart Software Manager On-Prem (SSM On-Prem) podría permitir a un atacante autenticado remoto elevar privilegios y ejecutar comandos con privilegios mayores. La vulnerabilidad es debido a una autorización insuficiente de las capacidades del rol System Operator. Un atacante podría explotar esta vulnerabilidad iniciando sesión con el rol de System Operator, llevando a cabo una serie de acciones y luego asumiendo un nuevo rol más privilegiado. Una explotación con éxito podría permitir a un atacante realizar todas las acciones asociadas con el privilegio del rol asumido. Si ese rol es un rol administrativo, el atacante obtendría acceso completo al dispositivo

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-08-26 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-11-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Smart Software Manager On-prem
Search vendor "Cisco" for product "Smart Software Manager On-prem"
8-202004
Search vendor "Cisco" for product "Smart Software Manager On-prem" and version "8-202004"
-
Affected