Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w687-qrqx-jr57

Опубликовано: 21 мая 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system.

This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. 

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system.

This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. 

EPSS

Процентиль: 19%
0.0006
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.5
nvd
29 дней назад

A vulnerability in the web-based management interface of Cisco Secure Network Analytics Manager and Cisco Secure Network Analytics Virtual Manager could allow an authenticated, remote attacker with valid administrative credentials to execute arbitrary commands as root on the underlying operating system. This vulnerability is due to insufficient input validation in specific fields of the web-based management interface. An attacker with valid administrative credentials could exploit this vulnerability by sending crafted input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges. 

CVSS3: 6.5
fstec
29 дней назад

Уязвимость веб-интерфейса управления систем анализа сетевого трафика, сетевого обнаружения и реагирования Cisco Secure Network Analytics Manager и Cisco Secure Network Analytics Virtual Manager, позволяющая нарушителю выполнять произвольные команды

EPSS

Процентиль: 19%
0.0006
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-74