ID

VAR-201705-3738


CVE

CVE-2017-6623


TITLE

For appliance Cisco Policy Suite Privilege levels in script files installed as part of software distribution root Vulnerability promoted to

Trust: 0.8

sources: JVNDB: JVNDB-2017-004118

DESCRIPTION

A vulnerability in a script file that is installed as part of the Cisco Policy Suite (CPS) Software distribution for the CPS appliance could allow an authenticated, local attacker to escalate their privilege level to root. The vulnerability is due to incorrect sudoers permissions on the script file. An attacker could exploit this vulnerability by authenticating to the device and providing crafted user input at the CLI, using this script file to escalate their privilege level and execute commands as root. A successful exploit could allow the attacker to acquire root-level privileges and take full control of the appliance. The user has to be logged-in to the device with valid credentials for a specific set of users. The Cisco Policy Suite application is vulnerable when running software versions 10.0.0, 10.1.0, or 11.0.0. Cisco Bug IDs: CSCvc07366. Vendors have confirmed this vulnerability Bug ID CSCvc07366 It is released as.Privilege level by an authenticated local attacker root May be promoted to. The software provides functions such as user-based business rules, real-time management of applications and network resources. The script files in CPS Software versions 10.0.0, 10.1.0, and 11.0.0 have a directory traversal vulnerability

Trust: 1.98

sources: NVD: CVE-2017-6623 // JVNDB: JVNDB-2017-004118 // BID: 98521 // VULHUB: VHN-114826

AFFECTED PRODUCTS

vendor:ciscomodel:policy suitescope:eqversion:10.0.0

Trust: 2.4

vendor:ciscomodel:policy suitescope:eqversion:10.1.0

Trust: 2.4

vendor:ciscomodel:policy suitescope:eqversion:11.0.0

Trust: 2.4

vendor:ciscomodel:policy suitescope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:policy suitescope:eqversion:10.1

Trust: 0.3

vendor:ciscomodel:policy suitescope:eqversion:10.0

Trust: 0.3

vendor:ciscomodel:policy suitescope:neversion:12.1

Trust: 0.3

vendor:ciscomodel:policy suitescope:neversion:12.0

Trust: 0.3

vendor:ciscomodel:policy suitescope:neversion:11.1

Trust: 0.3

sources: BID: 98521 // JVNDB: JVNDB-2017-004118 // CNNVD: CNNVD-201705-847 // NVD: CVE-2017-6623

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6623
value: HIGH

Trust: 1.0

NVD: CVE-2017-6623
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201705-847
value: HIGH

Trust: 0.6

VULHUB: VHN-114826
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-6623
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-114826
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6623
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114826 // JVNDB: JVNDB-2017-004118 // CNNVD: CNNVD-201705-847 // NVD: CVE-2017-6623

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

problemtype:CWE-269

Trust: 1.1

sources: VULHUB: VHN-114826 // JVNDB: JVNDB-2017-004118 // NVD: CVE-2017-6623

THREAT TYPE

local

Trust: 0.9

sources: BID: 98521 // CNNVD: CNNVD-201705-847

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201705-847

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-004118

PATCH

title:cisco-sa-20170517-cpsurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-cps

Trust: 0.8

title:Cisco Policy Suite Software Repair measures for path traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70378

Trust: 0.6

sources: JVNDB: JVNDB-2017-004118 // CNNVD: CNNVD-201705-847

EXTERNAL IDS

db:NVDid:CVE-2017-6623

Trust: 2.8

db:BIDid:98521

Trust: 2.0

db:JVNDBid:JVNDB-2017-004118

Trust: 0.8

db:CNNVDid:CNNVD-201705-847

Trust: 0.7

db:VULHUBid:VHN-114826

Trust: 0.1

sources: VULHUB: VHN-114826 // BID: 98521 // JVNDB: JVNDB-2017-004118 // CNNVD: CNNVD-201705-847 // NVD: CVE-2017-6623

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170517-cps

Trust: 2.0

url:http://www.securityfocus.com/bid/98521

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6623

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6623

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

sources: VULHUB: VHN-114826 // BID: 98521 // JVNDB: JVNDB-2017-004118 // CNNVD: CNNVD-201705-847 // NVD: CVE-2017-6623

CREDITS

Cisco

Trust: 0.3

sources: BID: 98521

SOURCES

db:VULHUBid:VHN-114826
db:BIDid:98521
db:JVNDBid:JVNDB-2017-004118
db:CNNVDid:CNNVD-201705-847
db:NVDid:CVE-2017-6623

LAST UPDATE DATE

2024-11-23T22:38:34.020000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114826date:2019-10-09T00:00:00
db:BIDid:98521date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004118date:2017-06-16T00:00:00
db:CNNVDid:CNNVD-201705-847date:2019-10-17T00:00:00
db:NVDid:CVE-2017-6623date:2024-11-21T03:30:09.113

SOURCES RELEASE DATE

db:VULHUBid:VHN-114826date:2017-05-18T00:00:00
db:BIDid:98521date:2017-05-17T00:00:00
db:JVNDBid:JVNDB-2017-004118date:2017-06-16T00:00:00
db:CNNVDid:CNNVD-201705-847date:2017-05-25T00:00:00
db:NVDid:CVE-2017-6623date:2017-05-18T19:29:00.283