// For flags

CVE-2017-12266

 

Severity Score

4.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the routine that loads DLL files in Cisco Meeting App for Windows could allow an authenticated, local attacker to run an executable file with privileges equivalent to those of Cisco Meeting App. The vulnerability is due to incomplete input validation of the path name for DLL files before they are loaded. An attacker could exploit this vulnerability by installing a crafted DLL file in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to those of Cisco Meeting App. The attacker would need valid user credentials to exploit this vulnerability. Cisco Bug IDs: CSCvd77907.

Una vulnerabilidad en la rutina que carga archivos DLL en Cisco Meeting App para Windows podría permitir que un atacante local autenticado ejecute un archivo ejecutable con privilegios equivalentes a los de Cisco Meeting App. La vulnerabilidad se debe a una validación incompleta de la entrada del nombre de ruta para archivos DLL antes de que se carguen. Un atacante podría explotar esta vulnerabilidad instalando un archivo DLL manipulado en un directorio del sistema específico. Con el exploit adecuado, el atacante podría ejecutar comandos en el host de Microsoft Windows subyacente con privilegios equivalentes a los de Cisco Meeting App. El atacante necesitaría credenciales de usuario válidas para explotar esta vulnerabilidad. Cisco Bug IDs: CSCvd77907.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-08-03 CVE Reserved
  • 2017-10-05 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-427: Uncontrolled Search Path Element
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Meeting App
Search vendor "Cisco" for product "Meeting App"
*-
Affected