Lucene search

K
cveCiscoCVE-2017-6667
HistoryJun 13, 2017 - 6:29 a.m.

CVE-2017-6667

2017-06-1306:29:01
CWE-20
cisco
web.nvd.nist.gov
22
vulnerability
cisco
context service
sdk
update process
remote code execution
cve-2017-6667
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.007

Percentile

80.2%

A vulnerability in the update process for the dynamic JAR file of the Cisco Context Service software development kit (SDK) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected device with the privileges of the web server. More Information: CSCvb66730. Known Affected Releases: 2.0.

Affected configurations

Nvd
Node
ciscocontext_service_development_kitMatch2.0
VendorProductVersionCPE
ciscocontext_service_development_kit2.0cpe:2.3:a:cisco:context_service_development_kit:2.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco Context Service SDK",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco Context Service SDK"
      }
    ]
  }
]

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.007

Percentile

80.2%

Related for CVE-2017-6667