NewsSecurity Vulnerabilities

Cisco BroadWorks Privilege Escalation Vulnerability [CVE-2023-20216]

CVE number = CVE-2023-20216

A vulnerability in the privilege management functionality of all Cisco BroadWorks server types could allow an authenticated, local attacker to elevate privileges to root on an affected system.

This vulnerability is due to incorrect implementation of user role permissions. An attacker could exploit this vulnerability by authenticating to the application as a user with the BWORKS or BWSUPERADMIN role and issuing crafted commands on an affected system.

A successful exploit could allow the attacker to execute commands beyond the sphere of their intended access level, including initiating installs or running operating system commands with elevated permissions.

Vulnerable Products

At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable release of Cisco BroadWorks Software:

  • BroadWorks Application Delivery Platform
  • BroadWorks Application Server
  • BroadWorks Database Server
  • BroadWorks Database Troubleshooting Server
  • BroadWorks Execution Server
  • BroadWorks Media Server
  • BroadWorks Messaging Server
  • BroadWorks Network Database Server
  • BroadWorks Network Function Manager
  • BroadWorks Network Server
  • BroadWorks Profile Server
  • BroadWorks Service Control Function Server
  • BroadWorks Sharing Server
  • BroadWorks Video Server
  • BroadWorks WebRTC Server
  • BroadWorks Xtended Services Platform

Cisco has released software updates that address this vulnerability.

There are workarounds that address this vulnerability.

Workarounds

  • There is a workaround that addresses this vulnerability.From the CLI, comment out the following line from /etc/sudoers.
  • The resulting line will be:# %wheel ALL=(ALL) ALL
    While this workaround has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.