7.8
CVE-2017-12243
- EPSS 40.22%
- Published 02.11.2017 16:29:00
- Last modified 20.04.2025 01:37:25
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Unified Computing System Manager Firmware Version-
Cisco ≫ Firepower 9300 Security Appliance Firmware Version-
Cisco ≫ Firepower 4100 Next-generation Firewall Firmware Version-
Cisco ≫ Firepower 4110 Next-generation Firewall Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 40.22% | 0.972 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.