Логотип exploitDog
bind:CVE-2018-0428
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-0428

Количество 3

Количество 3

nvd логотип

CVE-2018-0428

больше 7 лет назад

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-pc4c-2gp7-ch65

больше 3 лет назад

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2018-01432

больше 7 лет назад

Уязвимость подсистемы управления учетными записями веб-шлюза Cisco Web Security Appliance, позволяющая нарушителю выполнить системные команды с привилегиями root

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-0428

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

CVSS3: 6.7
0%
Низкий
больше 7 лет назад
github логотип
GHSA-pc4c-2gp7-ch65

A vulnerability in the account management subsystem of Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials. The vulnerability is due to improper implementation of access controls. An attacker could exploit this vulnerability by authenticating to the device as a specific user to gain the information needed to elevate privileges to root in a separate login shell. A successful exploit could allow the attacker to escape the CLI subshell and execute system-level commands on the underlying operating system as root. Cisco Bug IDs: CSCvj93548.

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-01432

Уязвимость подсистемы управления учетными записями веб-шлюза Cisco Web Security Appliance, позволяющая нарушителю выполнить системные команды с привилегиями root

CVSS3: 6.7
0%
Низкий
больше 7 лет назад

Уязвимостей на страницу