Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pc4c-2gp7-ch65

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

EPSS

Процентиль: 33%
0.00131
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 6.7
nvd
больше 7 лет назад

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

CVSS3: 6.7
fstec
больше 7 лет назад

Уязвимость подсистемы управления учетными записями веб-шлюза Cisco Web Security Appliance, позволяющая нарушителю выполнить системные команды с привилегиями root

EPSS

Процентиль: 33%
0.00131
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-269