Lucene search

K
ciscoCiscoCISCO-SA-20150605-CVE-2015-0767
HistoryJun 05, 2015 - 12:35 a.m.

Cisco Edge 340 Privilege Escalation Vulnerability

2015-06-0500:35:20
tools.cisco.com
22

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the system configuration of Cisco Edge 340 could allow an authenticated, local attacker to run arbitrary programs with elevated privileges.

The vulnerability is due to insufficient access control protections. An attacker could exploit this vulnerability by logging in to the system and executing commands that could lead to elevated privileges. An exploit could allow the attacker to execute commands as the root system user.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. This access requirement decreases the likelihood of a successful exploit.

Affected configurations

Vulners
Node
cisco300_series_managed_switchesMatchany
OR
ciscocisco_edgeMatch300_series
VendorProductVersionCPE
cisco300_series_managed_switchesanycpe:2.3:h:cisco:300_series_managed_switches:any:*:*:*:*:*:*:*
ciscocisco_edge300_seriescpe:2.3:a:cisco:cisco_edge:300_series:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20150605-CVE-2015-0767