CVE-2017-6781
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.
Una vulnerabilidad en la gestión de cuentas de usuario shell para Cisco Policy Suite (CPS) Software para aparatos CPS podría permitir que un atacante local autenticado gane privilegios elevados en un sistema afectado. El nivel de privilegios afectado no está a nivel root. La vulnerabilidad se debe a un control de acceso basado en roles o RBAC (role-based access control) incorrecto para cuentas de usuario shell. Un atacante podría explotar esta vulnerabilidad autenticándose en un aparato afectado y proporcionando entradas de usuario manipuladas mediante el CLI. Un exploit exitoso podría permitir que el atacante adquiera un mayor nivel de privilegios que el que tendría que tener. Para explotar esta vulnerabilidad, el atacante debe iniciar sesión en el aparato con credenciales válidas. Cisco Bug IDs: CSCve37724. Versiones afectadas conocidas: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-09 CVE Reserved
- 2017-08-17 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/100365 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cps | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 9.0.0 Search vendor "Cisco" for product "Policy Suite" and version "9.0.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 9.1.0 Search vendor "Cisco" for product "Policy Suite" and version "9.1.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 10.0.0 Search vendor "Cisco" for product "Policy Suite" and version "10.0.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 11.0.0 Search vendor "Cisco" for product "Policy Suite" and version "11.0.0" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Policy Suite Search vendor "Cisco" for product "Policy Suite" | 12.0.0 Search vendor "Cisco" for product "Policy Suite" and version "12.0.0" | - |
Affected
|