Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qvpj-hmr8-j79p

Опубликовано: 04 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6

Описание

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.

This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user.

This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.

EPSS

Процентиль: 2%
0.00013
Низкий

6 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6
nvd
8 месяцев назад

A vulnerability in the CLI of multiple Cisco Unified Communications products could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. This vulnerability is due to improper validation of user-supplied command arguments. An attacker could exploit this vulnerability by executing crafted commands on the CLI of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of an affected device as the root user. To exploit this vulnerability, the attacker must have valid administrative credentials.

CVSS3: 6
fstec
8 месяцев назад

Уязвимость веб-интерфейса управлениясистем обработки вызовов Cisco Unified Communications, связанная с непринятием мер по чистке данных на управляющем уровне, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

EPSS

Процентиль: 2%
0.00013
Низкий

6 Medium

CVSS3

Дефекты

CWE-77