Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fpvx-gw57-2p3v

Опубликовано: 15 мая 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.

This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.

This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.

EPSS

Процентиль: 36%
0.0015
Низкий

7.8 High

CVSS3

Дефекты

CWE-427
CWE-73

Связанные уязвимости

CVSS3: 7.8
nvd
больше 1 года назад

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device. This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость функционального пакета Tail-f High Availability Cluster Communications (HCC) программного средства автоматизации Cisco Network Services Orchestrator (NSO), позволяющая нарушителю выполнить произвольный код с root-привилегиями

EPSS

Процентиль: 36%
0.0015
Низкий

7.8 High

CVSS3

Дефекты

CWE-427
CWE-73