CERTFR-2023-AVI-0906
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Cisco. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.

Dans le bulletin de sécurité Cisco cisco-sa-ftd-intrusion-dos-DfT7wyGC du 01 novembre 2023, Cisco fournit des indicateurs de compromission pour vérifier si la vulnérabilité CVE-2023-20244 a été exploitée.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Cisco Adaptive Security Appliance Cisco Adaptive Security Appliance (ASA), se référer au site de l'éditeur pour vérifier les versions vulnérables (cf. section Documentation)
Cisco Identity Services Engine Cisco Identity Services Engine (ISE) versions antérieures à 2.7P10
Cisco Identity Services Engine Cisco Identity Services Engine (ISE) versions 3.1.x antérieures à 3.1P8 (annoncée courant novembre 2023, la vulnérabilité CVE-2023-20213 est corrigée dans la version 3.1P6)
Cisco Identity Services Engine Cisco Identity Services Engine (ISE) versions 3.2.x antérieures à 3.2P3
Cisco Firepower Threat Defense Cisco Firepower Threat Defense (FTD), se référer au site de l'éditeur pour vérifier les versions vulnérables (cf. section Documentation)
Cisco N/A Cisco Firepower Management Center (FMC), se référer au site de l'éditeur pour vérifier les versions vulnérables (cf. section Documentation)
Cisco Identity Services Engine Cisco Identity Services Engine (ISE) versions 3.0.x antérieures à 3.0P8

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cisco Adaptive Security Appliance (ASA), se r\u00e9f\u00e9rer au site de l\u0027\u00e9diteur pour v\u00e9rifier les versions vuln\u00e9rables (cf. section Documentation)",
      "product": {
        "name": "Adaptive Security Appliance",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Identity Services Engine (ISE) versions ant\u00e9rieures \u00e0 2.7P10",
      "product": {
        "name": "Identity Services Engine",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Identity Services Engine (ISE) versions 3.1.x ant\u00e9rieures \u00e0 3.1P8 (annonc\u00e9e courant novembre 2023, la vuln\u00e9rabilit\u00e9 CVE-2023-20213 est corrig\u00e9e dans la version 3.1P6)",
      "product": {
        "name": "Identity Services Engine",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Identity Services Engine (ISE) versions 3.2.x ant\u00e9rieures \u00e0 3.2P3",
      "product": {
        "name": "Identity Services Engine",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Threat Defense (FTD), se r\u00e9f\u00e9rer au site de l\u0027\u00e9diteur pour v\u00e9rifier les versions vuln\u00e9rables (cf. section Documentation)",
      "product": {
        "name": "Firepower Threat Defense",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Firepower Management Center (FMC), se r\u00e9f\u00e9rer au site de l\u0027\u00e9diteur pour v\u00e9rifier les versions vuln\u00e9rables (cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Cisco Identity Services Engine (ISE) versions 3.0.x ant\u00e9rieures \u00e0 3.0P8",
      "product": {
        "name": "Identity Services Engine",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-20213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20213"
    },
    {
      "name": "CVE-2023-20155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20155"
    },
    {
      "name": "CVE-2023-20063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20063"
    },
    {
      "name": "CVE-2023-20219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20219"
    },
    {
      "name": "CVE-2023-20196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20196"
    },
    {
      "name": "CVE-2023-20086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20086"
    },
    {
      "name": "CVE-2023-20244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20244"
    },
    {
      "name": "CVE-2023-20220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20220"
    },
    {
      "name": "CVE-2023-20083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20083"
    },
    {
      "name": "CVE-2023-20175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20175"
    },
    {
      "name": "CVE-2023-20170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20170"
    },
    {
      "name": "CVE-2023-20095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20095"
    },
    {
      "name": "CVE-2023-20048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20048"
    },
    {
      "name": "CVE-2023-20195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20195"
    }
  ],
  "initial_release_date": "2023-11-02T00:00:00",
  "last_revision_date": "2023-11-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0906",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n\nDans le bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-intrusion-dos-DfT7wyGC\ndu 01 novembre 2023, Cisco fournit des indicateurs de compromission pour\nv\u00e9rifier si la vuln\u00e9rabilit\u00e9 CVE-2023-20244 a \u00e9t\u00e9 exploit\u00e9e.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-icmpv6-t5TzqwNd du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-icmpv6-t5TzqwNd"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-intrusion-dos-DfT7wyGC du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-intrusion-dos-DfT7wyGC"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ise-file-upload-FceLP4xs du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-FceLP4xs"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-cmd-inj-29MP49hN du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-29MP49hN"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-icmpv6-dos-4eMkLuN du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-icmpv6-dos-4eMkLuN"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ise-injection-QeXegrCw du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-injection-QeXegrCw"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-logview-dos-AYJdeX55 du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-logview-dos-AYJdeX55"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-fmc-cmdinj-bTEgufOX du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmdinj-bTEgufOX"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-asa-webvpn-dos-3GhZQBAS du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-webvpn-dos-3GhZQBAS"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ftd-fmc-code-inj-wSHrgz8L du 01 novembre 2023",
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-fmc-code-inj-wSHrgz8L"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…