Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.140305
Category:CISCO
Title:Cisco Application Policy Infrastructure Controller Custom Binary Privilege Escalation Vulnerability
Summary:A vulnerability in the build procedure for certain executable system files;installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an;authenticated, local attacker to gain root-level privileges.
Description:Summary:
A vulnerability in the build procedure for certain executable system files
installed at boot time on Cisco Application Policy Infrastructure Controller (APIC) devices could allow an
authenticated, local attacker to gain root-level privileges.

Vulnerability Insight:
The vulnerability is due to a custom executable system file that was built
to use relative search paths for libraries without properly validating the library to be loaded. An attacker could
exploit this vulnerability by authenticating to the device and loading a malicious library that can escalate the
privilege level.

Vulnerability Impact:
A successful exploit could allow the attacker to gain root-level privileges
and take full control of the device. The attacker must have valid user credentials to log in to the device.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-6768
BugTraq ID: 100363
http://www.securityfocus.com/bid/100363
Cisco Security Advisory: 20170816 Cisco Application Policy Infrastructure Controller Custom Binary Privilege Escalation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic2
http://www.securitytracker.com/id/1039179
CopyrightCopyright (C) 2017 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.