Page 2 of 7 results (0.009 seconds)

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. • http://www.securityfocus.com/bid/100365 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cps • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

A vulnerability in a script file that is installed as part of the Cisco Policy Suite (CPS) Software distribution for the CPS appliance could allow an authenticated, local attacker to escalate their privilege level to root. The vulnerability is due to incorrect sudoers permissions on the script file. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input at the CLI, using this script file to escalate their privilege level and execute commands as root. A successful exploit could allow the attacker to acquire root-level privileges and take full control of the appliance. The user has to be logged-in to the device with valid credentials for a specific set of users. • http://www.securityfocus.com/bid/98521 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-cps • CWE-264: Permissions, Privileges, and Access Controls CWE-269: Improper Privilege Management •