Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pfrh-m7rq-gq4c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.

A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.

EPSS

Процентиль: 90%
0.05024
Низкий

7.2 High

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 7.2
nvd
больше 5 лет назад

A vulnerability in the implementation of the Lua interpreter integrated in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code with root privileges on the underlying Linux operating system of an affected device. The vulnerability is due to insufficient restrictions on the allowed Lua function calls within the context of user-supplied Lua scripts. A successful exploit could allow the attacker to trigger a heap overflow condition and execute arbitrary code with root privileges on the underlying Linux operating system of an affected device.

CVSS3: 7.2
fstec
больше 6 лет назад

Уязвимость реализации интерпретатора Lua интегрированного в микропрограммное обеспечение аппаратных межсетевых экранов Cisco Adaptive Security Appliance (ASA) и Configure Firepower Threat Defense (FTD), позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 90%
0.05024
Низкий

7.2 High

CVSS3

Дефекты

CWE-119
CWE-787