Lucene search

K
ciscoCiscoCISCO-SA-20161221-CCO
HistoryDec 21, 2016 - 4:00 p.m.

Cisco CloudCenter Orchestrator Docker Engine Privilege Escalation Vulnerability

2016-12-2116:00:00
tools.cisco.com
15

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.0%

A vulnerability in the Docker Engine configuration of Cisco CloudCenter
Orchestrator (CCO; formerly CliQr) could allow an unauthenticated, remote attacker to install Docker containers with high privileges on the affected system.

The
vulnerability is due to a misconfiguration that causes the Docker Engine management port to be reachable outside of the CloudCenter
Orchestrator system. An attacker could exploit this vulnerability by
loading Docker containers on the affected system with arbitrary
privileges. As a secondary impact this may allow the attacker to gain root
privileges on the affected CloudCenter Orchestrator.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-cco[β€œhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161221-cco”]

Affected configurations

Vulners
Node
ciscocloudcenter_orchestratorMatchany
OR
ciscocloudcenter_orchestratorMatchany
VendorProductVersionCPE
ciscocloudcenter_orchestratoranycpe:2.3:a:cisco:cloudcenter_orchestrator:any:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

68.0%

Related for CISCO-SA-20161221-CCO