Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.140305
Kategorie:CISCO
Titel:Cisco Application Policy Infrastructure Controller Custom Binary Privilege Escalation Vulnerability
Zusammenfassung:A vulnerability in the build procedure for certain executable system files;installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an;authenticated, local attacker to gain root-level privileges.
Beschreibung:Summary:
A vulnerability in the build procedure for certain executable system files
installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an
authenticated, local attacker to gain root-level privileges.

Vulnerability Insight:
The vulnerability is due to a custom executable system file that was built
to use relative search paths for libraries without properly validating the library to be loaded. An attacker could
exploit this vulnerability by authenticating to the device and loading a malicious library that can escalate the
privilege level.

Vulnerability Impact:
A successful exploit could allow the attacker to gain root-level privileges
and take full control of the device. The attacker must have valid user credentials to log in to the device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-6768
BugTraq ID: 100363
http://www.securityfocus.com/bid/100363
Cisco Security Advisory: 20170816 Cisco Application Policy Infrastructure Controller Custom Binary Privilege Escalation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2
http://www.securitytracker.com/id/1039179
CopyrightCopyright (C) 2017 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.