// For flags

CVE-2017-3801

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based GUI of Cisco UCS Director 6.0.0.0 and 6.0.0.1 could allow an authenticated, local attacker to execute arbitrary workflow items with just an end-user profile, a Privilege Escalation Vulnerability. The vulnerability is due to improper role-based access control (RBAC) after the Developer Menu is enabled in Cisco UCS Director. An attacker could exploit this vulnerability by enabling Developer Mode for his/her user profile with an end-user profile and then adding new catalogs with arbitrary workflow items to his/her profile. An exploit could allow an attacker to perform any actions defined by these workflow items, including actions affecting other tenants. Cisco Bug IDs: CSCvb64765.

Una vulnerabilidad en GUI basado en web de Cisco UCS Director 6.0.0.0 y 6.0.0.1 podría permitir a un atacante local no autenticado, ejecutar elementos arbitrarios de flujo de trabajo con tan solo un perfil de usuario final, una Vulnerabilidad de Escalada de Privilegios. La vulnerabilidad se debe a un control de acceso basado en roles (RBAC) inadecuado después de que el Developer Menu sea habilitado en Cisco UCS Director. Un atacante podría explotar esta vulnerabilidad habilitando Developer Mode para su perfil de usuario con un perfil de usuario final y añadiendo entonces nuevos catálogos con elementos arbitrarios de flujo de trabajo a su perfil. Un exploit podría permitir a un atacante llevar a cabo cualquier tipo de acciones definidas por estos elementos de flujo de trabajo, incluyendo acciones que afectaran a otros usuarios. Cisco Bug IDs: CSCvb64765.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-21 CVE Reserved
  • 2017-02-15 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-863: Incorrect Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Unified Computing System Director
Search vendor "Cisco" for product "Unified Computing System Director"
6.0.0.0
Search vendor "Cisco" for product "Unified Computing System Director" and version "6.0.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Unified Computing System Director
Search vendor "Cisco" for product "Unified Computing System Director"
6.0.0.1
Search vendor "Cisco" for product "Unified Computing System Director" and version "6.0.0.1"
-
Affected