var-201710-0634
Vulnerability from variot

A vulnerability in the web console of the Cisco Cloud Services Platform (CSP) 2100 could allow an authenticated, remote attacker to interact maliciously with the services or virtual machines (VMs) operating remotely on an affected CSP device. The vulnerability is due to weaknesses in the generation of certain authentication mechanisms in the URL of the web console. An attacker could exploit this vulnerability by browsing to one of the hosted VMs' URLs in Cisco CSP and viewing specific patterns that control the web application's mechanisms for authentication control. An exploit could allow the attacker to access a specific VM on the CSP, which causes a complete loss of the system's confidentiality, integrity, and availability. This vulnerability affects Cisco Cloud Services Platform (CSP) 2100 running software release 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, or 2.2.2. Cisco Bug IDs: CSCve64690. Vendors have confirmed this vulnerability Bug ID CSCve64690 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to bypass the security mechanism and gain unauthorized access. This may lead to further attacks. web console is one of the web console programs

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201710-0634",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.1.0"
      },
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.1.1"
      },
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.1.2"
      },
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.2.0"
      },
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.2.1"
      },
      {
        "model": "cloud services platform 2100",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "cisco",
        "version": "2.2.2"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2.2"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2.1"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.1.2"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.1.1"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.1"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2(2)"
      },
      {
        "model": "cloud services platform",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2(0)"
      },
      {
        "model": "cloud services platform",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "21002.2(3)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "101487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:cisco:cloud_services_platform_2100",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Chris Day",
    "sources": [
      {
        "db": "BID",
        "id": "101487"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-12251",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-12251",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-102755",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.1,
            "id": "CVE-2017-12251",
            "impactScore": 6.0,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-12251",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-12251",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201710-889",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-102755",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-12251",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A vulnerability in the web console of the Cisco Cloud Services Platform (CSP) 2100 could allow an authenticated, remote attacker to interact maliciously with the services or virtual machines (VMs) operating remotely on an affected CSP device. The vulnerability is due to weaknesses in the generation of certain authentication mechanisms in the URL of the web console. An attacker could exploit this vulnerability by browsing to one of the hosted VMs\u0027 URLs in Cisco CSP and viewing specific patterns that control the web application\u0027s mechanisms for authentication control. An exploit could allow the attacker to access a specific VM on the CSP, which causes a complete loss of the system\u0027s confidentiality, integrity, and availability. This vulnerability affects Cisco Cloud Services Platform (CSP) 2100 running software release 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, or 2.2.2. Cisco Bug IDs: CSCve64690. Vendors have confirmed this vulnerability Bug ID CSCve64690 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \nAn attacker can exploit this issue to bypass the security mechanism and gain unauthorized access. This may lead to further attacks. web console is one of the web console programs",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "BID",
        "id": "101487"
      },
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-12251",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "101487",
        "trust": 2.1
      },
      {
        "db": "SECTRACK",
        "id": "1039613",
        "trust": 1.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-102755",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "db": "BID",
        "id": "101487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "id": "VAR-201710-0634",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      }
    ],
    "trust": 0.6833333
  },
  "last_update_date": "2024-11-23T22:30:39.057000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20171018-ccs",
        "trust": 0.8,
        "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ccs"
      },
      {
        "title": "Cisco Cloud Services Platform 2100 web console Fixes for permission permissions and access control vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100117"
      },
      {
        "title": "Cisco: Cisco Cloud Services Platform 2100 Unauthorized Access Vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20171018-ccs"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-287",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.2,
        "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171018-ccs"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/101487"
      },
      {
        "trust": 1.8,
        "url": "http://www.securitytracker.com/id/1039613"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12251"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12251"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/287.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "db": "BID",
        "id": "101487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "db": "BID",
        "id": "101487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-10-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "date": "2017-10-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "BID",
        "id": "101487"
      },
      {
        "date": "2017-11-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "date": "2017-10-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "date": "2017-10-19T08:29:00.217000",
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-102755"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-12251"
      },
      {
        "date": "2017-10-18T00:00:00",
        "db": "BID",
        "id": "101487"
      },
      {
        "date": "2017-11-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      },
      {
        "date": "2024-11-21T03:09:10.210000",
        "db": "NVD",
        "id": "CVE-2017-12251"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Cloud Services Platform 2100 Vulnerabilities related to authorization, permissions, and access control",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009471"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201710-889"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…