Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-00300

Опубликовано: 11 янв. 2023
Источник: fstec
CVSS3: 5.5
CVSS2: 7.5
EPSS Низкий

Описание

Уязвимость реализации протокола NETCONF программного средства автоматизации Cisco Network Services Orchestrator (NSO) связана с неверным ограничением имени пути к каталогу с ограниченным доступом. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, повысить свои привилегии до уровня root в системе и вызвать отказ в обслуживании

Вендор

Cisco Systems Inc.

Наименование ПО

Network Services Orchestrator

Версия ПО

от 3.3 до 5.4.7 (Network Services Orchestrator)
от 5.5 до 5.5.6 (Network Services Orchestrator)
от 5.6 до 5.6.7 (Network Services Orchestrator)
от 5.7 до 5.7.4 (Network Services Orchestrator)
от 5,8 до 5.8.1 (Network Services Orchestrator)

Тип ПО

Сетевое средство

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-path-trvsl-zjBeMkZg#fs

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 81%
0.01504
Низкий

5.5 Medium

CVSS3

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 5.5
nvd
около 3 лет назад

A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group. This vulnerability exists because user-supplied input is not properly validated when NETCONF is used to upload packages to an affected device. An attacker could exploit this vulnerability by uploading a specially crafted package file. A successful exploit could allow the attacker to write crafted files to arbitrary locations on the filesystem or delete arbitrary files from the filesystem of an affected device, resulting in a DoS condition. Note: By default, during install, Cisco NSO will be set up to run as the root user unless the --run-as-user option is used.

CVSS3: 5.5
github
около 3 лет назад

A vulnerability in the NETCONF service of Cisco Network Services Orchestrator (NSO) could allow an authenticated, remote attacker to cause a denial of service (DoS) on an affected system that is running as the root user. To exploit this vulnerability, the attacker must be a member of the admin group. This vulnerability exists because user-supplied input is not properly validated when NETCONF is used to upload packages to an affected device. An attacker could exploit this vulnerability by uploading a specially crafted package file. A successful exploit could allow the attacker to write crafted files to arbitrary locations on the filesystem or delete arbitrary files from the filesystem of an affected device, resulting in a DoS condition. Note: By default, during install, Cisco NSO will be set up to run as the root user unless the --run-as-user option is used.

EPSS

Процентиль: 81%
0.01504
Низкий

5.5 Medium

CVSS3

7.5 High

CVSS2