// For flags

CVE-2017-12261

 

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the restricted shell of the Cisco Identity Services Engine (ISE) that is accessible via SSH could allow an authenticated, local attacker to run arbitrary CLI commands with elevated privileges. The vulnerability is due to incomplete input validation of the user input for CLI commands issued at the restricted shell. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. An attacker would need valid user credentials to the device to exploit this vulnerability. The vulnerability affects the following Cisco Identity Services Engine (ISE) products running Release 1.4, 2.0, 2.0.1, 2.1.0: ISE, ISE Express, ISE Virtual Appliance. Cisco Bug IDs: CSCve74916.

Una vulnerabilidad en el shell restringido de Cisco Identity Services Engine (ISE) que es accesible por SSH podría permitir que un atacante local autenticado ejecute comandos de la interfaz de línea de comandos con privilegios elevados. La vulnerabilidad se debe a la validación incompleta de los valores de entrada del usuario para los comandos de la interfaz de línea de comandos enviados al shell restringido. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo objetivo y ejecutando comandos que podrían conseguir privilegios elevados. Un atacante necesitaría credenciales de usuario válidas para el dispositivo para que se pueda explotar esta vulnerabilidad. La vulnerabilidad afecta a los siguientes productos de Cisco Identity Services Engine (ISE) que ejecuten la distribución 1.4, 2.0, 2.0.1 o 2.1.0: ISE, ISE Express e ISE Virtual Appliance. Cisco Bug IDs: CSCve74916.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-08-03 CVE Reserved
  • 2017-11-02 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
1.4
Search vendor "Cisco" for product "Identity Services Engine" and version "1.4"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
2.0
Search vendor "Cisco" for product "Identity Services Engine" and version "2.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
2.0.1
Search vendor "Cisco" for product "Identity Services Engine" and version "2.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine
Search vendor "Cisco" for product "Identity Services Engine"
2.1.0
Search vendor "Cisco" for product "Identity Services Engine" and version "2.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Express
Search vendor "Cisco" for product "Identity Services Engine Express"
1.4
Search vendor "Cisco" for product "Identity Services Engine Express" and version "1.4"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Express
Search vendor "Cisco" for product "Identity Services Engine Express"
2.0
Search vendor "Cisco" for product "Identity Services Engine Express" and version "2.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Express
Search vendor "Cisco" for product "Identity Services Engine Express"
2.0.1
Search vendor "Cisco" for product "Identity Services Engine Express" and version "2.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Express
Search vendor "Cisco" for product "Identity Services Engine Express"
2.1.0
Search vendor "Cisco" for product "Identity Services Engine Express" and version "2.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Virtual Appliance
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance"
1.4
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance" and version "1.4"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Virtual Appliance
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance"
2.0
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance" and version "2.0"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Virtual Appliance
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance"
2.0.1
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance" and version "2.0.1"
-
Affected
Cisco
Search vendor "Cisco"
Identity Services Engine Virtual Appliance
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance"
2.1.0
Search vendor "Cisco" for product "Identity Services Engine Virtual Appliance" and version "2.1.0"
-
Affected