// For flags

CVE-2017-6781

 

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.

Una vulnerabilidad en la gestión de cuentas de usuario shell para Cisco Policy Suite (CPS) Software para aparatos CPS podría permitir que un atacante local autenticado gane privilegios elevados en un sistema afectado. El nivel de privilegios afectado no está a nivel root. La vulnerabilidad se debe a un control de acceso basado en roles o RBAC (role-based access control) incorrecto para cuentas de usuario shell. Un atacante podría explotar esta vulnerabilidad autenticándose en un aparato afectado y proporcionando entradas de usuario manipuladas mediante el CLI. Un exploit exitoso podría permitir que el atacante adquiera un mayor nivel de privilegios que el que tendría que tener. Para explotar esta vulnerabilidad, el atacante debe iniciar sesión en el aparato con credenciales válidas. Cisco Bug IDs: CSCve37724. Versiones afectadas conocidas: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-03-09 CVE Reserved
  • 2017-08-17 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
9.0.0
Search vendor "Cisco" for product "Policy Suite" and version "9.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
9.1.0
Search vendor "Cisco" for product "Policy Suite" and version "9.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
10.0.0
Search vendor "Cisco" for product "Policy Suite" and version "10.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
11.0.0
Search vendor "Cisco" for product "Policy Suite" and version "11.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Policy Suite
Search vendor "Cisco" for product "Policy Suite"
12.0.0
Search vendor "Cisco" for product "Policy Suite" and version "12.0.0"
-
Affected