Lucene search

K
nvd[email protected]NVD:CVE-2017-12243
HistoryNov 02, 2017 - 4:29 p.m.

CVE-2017-12243

2017-11-0216:29:00
CWE-78
web.nvd.nist.gov
4

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.956

Percentile

99.4%

A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.

Affected configurations

Nvd
Node
ciscounified_computing_system_manager_firmwareMatch-
AND
ciscounified_computing_system_managerMatch-
Node
ciscofirepower_9300_security_appliance_firmwareMatch-
AND
ciscofirepower_9300_security_applianceMatch-
Node
ciscofirepower_4100_next-generation_firewall_firmwareMatch-
AND
ciscofirepower_4110_next-generation_firewallMatch-
OR
ciscofirepower_4120_next-generation_firewallMatch-
OR
ciscofirepower_4140_next-generation_firewallMatch-
OR
ciscofirepower_4150_next-generation_firewallMatch-
VendorProductVersionCPE
ciscounified_computing_system_manager_firmware-cpe:2.3:o:cisco:unified_computing_system_manager_firmware:-:*:*:*:*:*:*:*
ciscounified_computing_system_manager-cpe:2.3:h:cisco:unified_computing_system_manager:-:*:*:*:*:*:*:*
ciscofirepower_9300_security_appliance_firmware-cpe:2.3:o:cisco:firepower_9300_security_appliance_firmware:-:*:*:*:*:*:*:*
ciscofirepower_9300_security_appliance-cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:*
ciscofirepower_4100_next-generation_firewall_firmware-cpe:2.3:o:cisco:firepower_4100_next-generation_firewall_firmware:-:*:*:*:*:*:*:*
ciscofirepower_4110_next-generation_firewall-cpe:2.3:h:cisco:firepower_4110_next-generation_firewall:-:*:*:*:*:*:*:*
ciscofirepower_4120_next-generation_firewall-cpe:2.3:h:cisco:firepower_4120_next-generation_firewall:-:*:*:*:*:*:*:*
ciscofirepower_4140_next-generation_firewall-cpe:2.3:h:cisco:firepower_4140_next-generation_firewall:-:*:*:*:*:*:*:*
ciscofirepower_4150_next-generation_firewall-cpe:2.3:h:cisco:firepower_4150_next-generation_firewall:-:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.5

Confidence

High

EPSS

0.956

Percentile

99.4%