CVE-2017-6623
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in a script file that is installed as part of the Cisco Policy Suite (CPS) Software distribution for the CPS appliance could allow an authenticated, local attacker to escalate their privilege level to root. The vulnerability is due to incorrect sudoers permissions on the script file. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input at the CLI, using this script file to escalate their privilege level and execute commands as root. A successful exploit could allow the attacker to acquire root-level privileges and take full control of the appliance. The user has to be logged-in to the device with valid credentials for a specific set of users. The Cisco Policy Suite application is vulnerable when running software versions 10.0.0, 10.1.0, or 11.0.0. Cisco Bug IDs: CSCvc07366.
Una vulnerabilidad en un archivo de script que es instalado como parte de la distribución del Software Cisco Policy Suite (CPS) para el dispositivo CPS podría permitir que un atacante local autenticado aumente su nivel de privilegio a root. La vulnerabilidad es debido a permisos de sudoers incorrectos en el archivo de script. Un atacante podría explotar esta vulnerabilidad autenticándose en el dispositivo y proporcionando información de usuario diseñada en la CLI, usando este archivo de script para escalar su nivel de privilegio y ejecutar comandos como root. Una explotación con éxito podría permitir al atacante adquirir privilegios de nivel root y tomar el control total del dispositivo. El usuario debe iniciar sesión en el dispositivo con credenciales válidas para un conjunto específico de usuarios. La aplicación Cisco Policy Suite es vulnerable cuando se ejecutan las versiones de software 10.0.0, 10.1.0 u 11.0.0. IDs de Bug de Cisco: CSCvc07366.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-09 CVE Reserved
- 2017-05-18 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-269: Improper Privilege Management
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/98521 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-cps | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 10.0.0 Search vendor "Cisco" for product "Policy Suite" and version "10.0.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 10.1.0 Search vendor "Cisco" for product "Policy Suite" and version "10.1.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 11.0.0 Search vendor "Cisco" for product "Policy Suite" and version "11.0.0" | - |
Affected
|