|Title:||Cisco Web Security Appliance Authenticated Command Injection and Privilege Escalation Vulnerability|
|Summary:||A vulnerability in the CLI parser of the Cisco Web Security Appliance (WSA);could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The;attacker must authenticate with valid operator-level or administrator-level credentials.|
A vulnerability in the CLI parser of the Cisco Web Security Appliance (WSA)
could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The
attacker must authenticate with valid operator-level or administrator-level credentials.
The vulnerability is due to insufficient validation of user-supplied input in
the CLI parser. An attacker could exploit this vulnerability by authenticating to the affected device and
performing command injection over the CLI.
An exploit could allow the attacker to escape from the CLI subshell and
execute system-level commands on the underlying operating system as root.
See the referenced vendor advisory for a solution.
Common Vulnerability Exposure (CVE) ID: CVE-2017-6748|
BugTraq ID: 99918
|Copyright||This script is Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.