var-201708-1335
Vulnerability from variot
A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0. Vendors have confirmed this vulnerability Bug ID CSCve37724 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Local attackers may exploit this issue to gain elevated privileges. The software provides functions such as user-based business rules, real-time management of applications and network resources
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1335", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "policy suite", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.1.0" }, { "model": "policy suite", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "9.0.0" }, { "model": "policy suite", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "10.0.0" }, { "model": "policy suite", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "12.0.0" }, { "model": "policy suite", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "11.0.0" }, { "model": "policy suite", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "policy suite software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "mobility services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "mobility services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "11.0" }, { "model": "mobility services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0" }, { "model": "mobility services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.1" }, { "model": "mobility services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9.0" } ], "sources": [ { "db": "BID", "id": "100365" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cisco:cisco_policy_suite", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007253" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco.", "sources": [ { "db": "BID", "id": "100365" }, { "db": "CNNVD", "id": "CNNVD-201708-720" } ], "trust": 0.9 }, "cve": "CVE-2017-6781", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2017-6781", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-114984", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2017-6781", "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-6781", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-6781", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201708-720", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-114984", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-114984" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the management of shell user accounts for Cisco Policy Suite (CPS) Software for CPS appliances could allow an authenticated, local attacker to gain elevated privileges on an affected system. The affected privilege level is not at the root level. The vulnerability is due to incorrect role-based access control (RBAC) for shell user accounts. An attacker could exploit this vulnerability by authenticating to an affected appliance and providing crafted user input via the CLI. A successful exploit could allow the attacker to acquire a higher privilege level than should have been granted. To exploit this vulnerability, the attacker must log in to the appliance with valid credentials. Cisco Bug IDs: CSCve37724. Known Affected Releases: 9.0.0, 9.1.0, 10.0.0, 11.0.0, 12.0.0. Vendors have confirmed this vulnerability Bug ID CSCve37724 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \nLocal attackers may exploit this issue to gain elevated privileges. The software provides functions such as user-based business rules, real-time management of applications and network resources", "sources": [ { "db": "NVD", "id": "CVE-2017-6781" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "BID", "id": "100365" }, { "db": "VULHUB", "id": "VHN-114984" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6781", "trust": 2.8 }, { "db": "BID", "id": "100365", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2017-007253", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201708-720", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-114984", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114984" }, { "db": "BID", "id": "100365" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "id": "VAR-201708-1335", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-114984" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:00:54.903000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170816-cps", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-cps" }, { "title": "Cisco Policy Suite Software Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74071" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "CWE-264", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114984" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170816-cps" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/100365" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6781" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6781" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-114984" }, { "db": "BID", "id": "100365" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-114984" }, { "db": "BID", "id": "100365" }, { "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "db": "CNNVD", "id": "CNNVD-201708-720" }, { "db": "NVD", "id": "CVE-2017-6781" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-17T00:00:00", "db": "VULHUB", "id": "VHN-114984" }, { "date": "2017-08-16T00:00:00", "db": "BID", "id": "100365" }, { "date": "2017-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "date": "2017-08-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-720" }, { "date": "2017-08-17T20:29:00.713000", "db": "NVD", "id": "CVE-2017-6781" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-114984" }, { "date": "2017-08-16T00:00:00", "db": "BID", "id": "100365" }, { "date": "2017-09-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-007253" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201708-720" }, { "date": "2024-11-21T03:30:30.970000", "db": "NVD", "id": "CVE-2017-6781" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "100365" }, { "db": "CNNVD", "id": "CNNVD-201708-720" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Policy Suite Vulnerability related to authorization, authority, and access control in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-007253" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201708-720" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.