Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xqw8-9f8f-59wq

Опубликовано: 17 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 5.5

Описание

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

EPSS

Процентиль: 15%
0.0005
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-250

Связанные уязвимости

CVSS3: 5.5
nvd
больше 2 лет назад

A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.

EPSS

Процентиль: 15%
0.0005
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-250