Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2017-02080

Опубликовано: 16 авг. 2017
Источник: fstec
CVSS2: 7.2
EPSS Низкий

Описание

Уязвимость встроенной процедуры исполняемых системных файлов, устанавливаемых во время загрузки программного средства автоматизации Application Policy Infrastructure Controller, связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю, действующему локально, повысить привилегии, получив доступ к корневым папкам и полный контроль над устройством с помощью загрузки вредоносной библиотеки

Вендор

Cisco Systems Inc.

Наименование ПО

Application Policy Infrastructure Controller

Версия ПО

1.1(0.920a) (Application Policy Infrastructure Controller)
1.1(1j) (Application Policy Infrastructure Controller)
1.1(3f) (Application Policy Infrastructure Controller)
1.2 Base (Application Policy Infrastructure Controller)
1.2(2) (Application Policy Infrastructure Controller)
1.2(3) (Application Policy Infrastructure Controller)
1.2.2 (Application Policy Infrastructure Controller)
1.3(1) (Application Policy Infrastructure Controller)
1.3(2) (Application Policy Infrastructure Controller)
1.3(2f) (Application Policy Infrastructure Controller)
2.0 Base (Application Policy Infrastructure Controller)
2.0(1) (Application Policy Infrastructure Controller)

Тип ПО

ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,2)

Возможные меры по устранению уязвимости

Используемые рекомендации:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 25%
0.00086
Низкий

7.2 High

CVSS2

Связанные уязвимости

CVSS3: 7.8
nvd
больше 8 лет назад

A vulnerability in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an authenticated, local attacker to gain root-level privileges. The vulnerability is due to a custom executable system file that was built to use relative search paths for libraries without properly validating the library to be loaded. An attacker could exploit this vulnerability by authenticating to the device and loading a malicious library that can escalate the privilege level. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. The attacker must have valid user credentials to log in to the device. Cisco Bug IDs: CSCvc96087. Known Affected Releases: 1.1(0.920a), 1.1(1j), 1.1(3f); 1.2 Base, 1.2(2), 1.2(3), 1.2.2; 1.3(1), 1.3(2), 1.3(2f); 2.0 Base, 2.0(1).

CVSS3: 7.8
github
больше 3 лет назад

A vulnerability in the build procedure for certain executable system files installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an authenticated, local attacker to gain root-level privileges. The vulnerability is due to a custom executable system file that was built to use relative search paths for libraries without properly validating the library to be loaded. An attacker could exploit this vulnerability by authenticating to the device and loading a malicious library that can escalate the privilege level. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. The attacker must have valid user credentials to log in to the device. Cisco Bug IDs: CSCvc96087. Known Affected Releases: 1.1(0.920a), 1.1(1j), 1.1(3f); 1.2 Base, 1.2(2), 1.2(3), 1.2.2; 1.3(1), 1.3(2), 1.3(2f); 2.0 Base, 2.0(1).

EPSS

Процентиль: 25%
0.00086
Низкий

7.2 High

CVSS2