7.8
CVE-2017-12261
- EPSS 0.05%
- Published 02.11.2017 16:29:00
- Last modified 20.04.2025 01:37:25
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the restricted shell of the Cisco Identity Services Engine (ISE) that is accessible via SSH could allow an authenticated, local attacker to run arbitrary CLI commands with elevated privileges. The vulnerability is due to incomplete input validation of the user input for CLI commands issued at the restricted shell. An attacker could exploit this vulnerability by authenticating to the targeted device and executing commands that could lead to elevated privileges. An attacker would need valid user credentials to the device to exploit this vulnerability. The vulnerability affects the following Cisco Identity Services Engine (ISE) products running Release 1.4, 2.0, 2.0.1, 2.1.0: ISE, ISE Express, ISE Virtual Appliance. Cisco Bug IDs: CSCve74916.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Identity Services Engine Version1.4
Cisco ≫ Identity Services Engine Version2.0
Cisco ≫ Identity Services Engine Version2.0.1
Cisco ≫ Identity Services Engine Version2.1.0
Cisco ≫ Identity Services Engine Express Version1.4
Cisco ≫ Identity Services Engine Express Version2.0
Cisco ≫ Identity Services Engine Express Version2.0.1
Cisco ≫ Identity Services Engine Express Version2.1.0
Cisco ≫ Identity Services Engine Virtual Appliance Version1.4
Cisco ≫ Identity Services Engine Virtual Appliance Version2.0
Cisco ≫ Identity Services Engine Virtual Appliance Version2.0.1
Cisco ≫ Identity Services Engine Virtual Appliance Version2.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.11 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-863 Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.