Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Cisco Ultra Services Framework Staging Server Arbitrary Command Execution Vulnerability
Informations
Name cisco-sa-20170705-usf3 First vendor Publication 2017-07-05
Vendor Cisco Last vendor Modification 2017-07-05
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the AutoIT service of Cisco Ultra Services Framework Staging Server could allow an unauthenticated, remote attacker to execute arbitrary shell commands as the Linux root user.

The vulnerability is due to improper shell invocations. An attacker could exploit this vulnerability by crafting CLI command inputs to execute Linux shell commands as the root user. An exploit could allow the attacker to execute arbitrary shell commands as the Linux root user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf3"]

BEGIN PGP SIGNATURE

iQKBBAEBAgBrBQJZXQ8MZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHm4vhAAgO7AI5T0r3B3MkNn 45EEySRpQtrgv8oqAssS1Cb4RjryY/7yk3ofmPIsDbIo9mfFHZ5C8CXwp/7OFjIi fdR8wlMKinQ2NUeI8RQSVZRmh4UjOmsPcxPacF8EXRlo+ZY0iYDNIWr/u/06vslT 7soylaLb+M48BvtxVnxpc7VLTP/9swF8tfzW2EYLdMIW9pG1hNfop49cMiaF/u8y L597uP1TmEEPgV7mnSyCUmxdlrdc1AUQdk++PtFbIgPJPH5lBLYax2CirmyvK+gI W5yisdz4m7ZYCUypoAcQn6D3L4jSVFecl26hr3NLvsidQCSAdN+eQOSVcJHl/UrL WetL/0fmGPlRO5qrf595kN9gMPTQOvBF12Cr+Wz0N9Bsh6P4pkv1r4cIaRP6Bl/T a+2nsAJN6ldZEnez1Tk/2kM2g8F6l0bXBH996UQfqZt2t9PtBlYduPzpvVUTDiPl VViXs916KSBqOUkWj/3+9OyTIPPWvjukTP7oGkOoiyY99nNP5odqT6i0ShGXYKhG lGVpxHfE6FG2nEMLfY5qVGrH6bpQ8RCCcJtpa51uh8+afsKkBw8Djf3E1fScAcOu 4MMlPAjG+WiAF5urUCMSYGov4M25L2DDl0hWgiMrJdD2rSwzUhtdbnbe/LiK7Ilu aFsPDgy1REQqoPXfHzGBMdKU/zo= =7LYj END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Snort® IPS/IDS

Date Description
2017-07-06 Cisco Ultra Services Framework command injection attempt
RuleID : 43456 - Revision : 1 - Type : SERVER-WEBAPP

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-07-07 21:24:49
  • Multiple Updates
2017-07-06 09:24:47
  • Multiple Updates
2017-07-06 00:22:12
  • First insertion