ID

VAR-201703-0904


CVE

CVE-2017-3851


TITLE

Cisco IOx Path traversal vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-002641

DESCRIPTION

A Directory Traversal vulnerability in the web framework code of the Cisco application-hosting framework (CAF) component of the Cisco IOx application environment could allow an unauthenticated, remote attacker to read any file from the CAF in the virtual instance running on the affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting crafted requests to the CAF web interface. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52302. Cisco IOx Contains a path traversal vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuy52302 It is released as.Information may be obtained. Cisco IOx is a set of applications that provide unified hosting capabilities for the Cisco IoT network infrastructure (Cisco routers, switches, etc.). Cisco Application-hosting Framework (CAF) is one of the application hosting framework components. A remote attacker could use this vulnerability to read arbitrary files. Information harvested may aid in launching further attacks

Trust: 3.15

sources: NVD: CVE-2017-3851 // JVNDB: JVNDB-2017-002641 // CNVD: CNVD-2017-03876 // CNNVD: CNNVD-201703-994 // BID: 97013 // VULHUB: VHN-112054 // VULMON: CVE-2017-3851

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-03876

AFFECTED PRODUCTS

vendor:ciscomodel:ioxscope:eqversion:1.1.0

Trust: 1.6

vendor:ciscomodel:ioxscope:eqversion:1.1\(0\)

Trust: 1.6

vendor:ciscomodel:iox softwarescope:eqversion:1.1.0.0

Trust: 0.9

vendor:ciscomodel:iox softwarescope:eqversion:1.0.0.0

Trust: 0.9

vendor:ciscomodel:ioxscope:eqversion:1.0.0.0

Trust: 0.8

vendor:ciscomodel:ioxscope:eqversion:1.1.0.0

Trust: 0.8

vendor:ciscomodel:isr4451scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:isr4351scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:isr4331scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:isr4321scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ir829scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ir809scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr1002xscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr1002hxscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr1001xscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr1001hxscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:application-hosting frameworkscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:iox softwarescope:neversion:1.2.4.2

Trust: 0.3

sources: CNVD: CNVD-2017-03876 // BID: 97013 // JVNDB: JVNDB-2017-002641 // CNNVD: CNNVD-201703-994 // NVD: CVE-2017-3851

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-3851
value: HIGH

Trust: 1.0

NVD: CVE-2017-3851
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-03876
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201703-994
value: MEDIUM

Trust: 0.6

VULHUB: VHN-112054
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-3851
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-3851
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-03876
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-112054
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-3851
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-03876 // VULHUB: VHN-112054 // VULMON: CVE-2017-3851 // JVNDB: JVNDB-2017-002641 // CNNVD: CNNVD-201703-994 // NVD: CVE-2017-3851

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-112054 // JVNDB: JVNDB-2017-002641 // NVD: CVE-2017-3851

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-994

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201703-994

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002641

PATCH

title:cisco-sa-20170322-caf1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-caf1

Trust: 0.8

title:Patch for Web Framework Directory Traversal Vulnerability in Cisco IoxCAF Componenturl:https://www.cnvd.org.cn/patchInfo/show/91247

Trust: 0.6

title:Cisco IOx Cisco Application-hosting Framework Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68705

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.1

sources: CNVD: CNVD-2017-03876 // VULMON: CVE-2017-3851 // JVNDB: JVNDB-2017-002641 // CNNVD: CNNVD-201703-994

EXTERNAL IDS

db:NVDid:CVE-2017-3851

Trust: 3.5

db:BIDid:97013

Trust: 1.5

db:SECTRACKid:1038106

Trust: 1.2

db:SECTRACKid:1038107

Trust: 1.2

db:JVNDBid:JVNDB-2017-002641

Trust: 0.8

db:CNNVDid:CNNVD-201703-994

Trust: 0.7

db:CNVDid:CNVD-2017-03876

Trust: 0.6

db:VULHUBid:VHN-112054

Trust: 0.1

db:VULMONid:CVE-2017-3851

Trust: 0.1

sources: CNVD: CNVD-2017-03876 // VULHUB: VHN-112054 // VULMON: CVE-2017-3851 // BID: 97013 // JVNDB: JVNDB-2017-002641 // CNNVD: CNNVD-201703-994 // NVD: CVE-2017-3851

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170322-caf1

Trust: 2.7

url:http://www.securityfocus.com/bid/97013

Trust: 1.3

url:http://www.securitytracker.com/id/1038106

Trust: 1.2

url:http://www.securitytracker.com/id/1038107

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3851

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-3851

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/22.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.1

sources: CNVD: CNVD-2017-03876 // VULHUB: VHN-112054 // VULMON: CVE-2017-3851 // BID: 97013 // JVNDB: JVNDB-2017-002641 // CNNVD: CNNVD-201703-994 // NVD: CVE-2017-3851

CREDITS

Cisco

Trust: 0.3

sources: BID: 97013

SOURCES

db:CNVDid:CNVD-2017-03876
db:VULHUBid:VHN-112054
db:VULMONid:CVE-2017-3851
db:BIDid:97013
db:JVNDBid:JVNDB-2017-002641
db:CNNVDid:CNNVD-201703-994
db:NVDid:CVE-2017-3851

LAST UPDATE DATE

2024-11-23T22:07:30.613000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-03876date:2017-04-03T00:00:00
db:VULHUBid:VHN-112054date:2017-07-12T00:00:00
db:VULMONid:CVE-2017-3851date:2017-07-12T00:00:00
db:BIDid:97013date:2017-03-23T00:01:00
db:JVNDBid:JVNDB-2017-002641date:2017-04-24T00:00:00
db:CNNVDid:CNNVD-201703-994date:2017-03-23T00:00:00
db:NVDid:CVE-2017-3851date:2024-11-21T03:26:14.587

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-03876date:2017-04-05T00:00:00
db:VULHUBid:VHN-112054date:2017-03-22T00:00:00
db:VULMONid:CVE-2017-3851date:2017-03-22T00:00:00
db:BIDid:97013date:2017-03-22T00:00:00
db:JVNDBid:JVNDB-2017-002641date:2017-04-24T00:00:00
db:CNNVDid:CNNVD-201703-994date:2017-03-23T00:00:00
db:NVDid:CVE-2017-3851date:2017-03-22T19:59:00.167