CVE-2023-5183 Vulnerability Details

  /     /     /  

CVE-2023-5183 Metadata Quick Info

CVE Published: 26/09/2023 | CVE Updated: 24/09/2024 | CVE Year: 2023
Source: Illumio | Vendor: Illumio | Product: Core PCE
Status : PUBLISHED

CVE-2023-5183 Description

Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.  

Metrics

CVSS Version: 3.1 | Base Score: 9.9 CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* NONE
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-502
CWE Name: CWE-502 Deserialization of Untrusted Data
Source: Illumio

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-586
CAPEC Description: CAPEC-586 Object Injection


Source: NVD (National Vulnerability Database).