Lucene search

K
nvd[email protected]NVD:CVE-2017-6746
HistoryJul 25, 2017 - 7:29 p.m.

CVE-2017-6746

2017-07-2519:29:00
CWE-20
web.nvd.nist.gov
6

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

64.9%

A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid administrator credentials. Affected Products: Cisco AsyncOS Software 10.0 and later for WSA on both virtual and hardware appliances. More Information: CSCvd88862. Known Affected Releases: 10.1.0-204. Known Fixed Releases: 10.5.1-270 10.1.1-235.

Affected configurations

Nvd
Node
ciscoweb_security_applianceMatch10.0.0-233
OR
ciscoweb_security_applianceMatch10.0_base
OR
ciscoweb_security_applianceMatch10.1.0
OR
ciscoweb_security_applianceMatch10.1.0-204
OR
ciscoweb_security_applianceMatch10.1.1-230
OR
ciscoweb_security_applianceMatch10.1.1-234
OR
ciscoweb_security_applianceMatch10.5.0
OR
ciscoweb_security_applianceMatch10.5.0-358
OR
ciscoweb_security_applianceMatch11.0.0
OR
ciscoweb_security_applianceMatch11.0.0-613
OR
ciscoweb_security_applianceMatch11.0.0-641
VendorProductVersionCPE
ciscoweb_security_appliance10.0.0-233cpe:2.3:a:cisco:web_security_appliance:10.0.0-233:*:*:*:*:*:*:*
ciscoweb_security_appliance10.0_basecpe:2.3:a:cisco:web_security_appliance:10.0_base:*:*:*:*:*:*:*
ciscoweb_security_appliance10.1.0cpe:2.3:a:cisco:web_security_appliance:10.1.0:*:*:*:*:*:*:*
ciscoweb_security_appliance10.1.0-204cpe:2.3:a:cisco:web_security_appliance:10.1.0-204:*:*:*:*:*:*:*
ciscoweb_security_appliance10.1.1-230cpe:2.3:a:cisco:web_security_appliance:10.1.1-230:*:*:*:*:*:*:*
ciscoweb_security_appliance10.1.1-234cpe:2.3:a:cisco:web_security_appliance:10.1.1-234:*:*:*:*:*:*:*
ciscoweb_security_appliance10.5.0cpe:2.3:a:cisco:web_security_appliance:10.5.0:*:*:*:*:*:*:*
ciscoweb_security_appliance10.5.0-358cpe:2.3:a:cisco:web_security_appliance:10.5.0-358:*:*:*:*:*:*:*
ciscoweb_security_appliance11.0.0cpe:2.3:a:cisco:web_security_appliance:11.0.0:*:*:*:*:*:*:*
ciscoweb_security_appliance11.0.0-613cpe:2.3:a:cisco:web_security_appliance:11.0.0-613:*:*:*:*:*:*:*
Rows per page:
1-10 of 111

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0.002

Percentile

64.9%

Related for NVD:CVE-2017-6746