9
CVE-2017-12277
- EPSS 0.55%
- Published 02.11.2017 16:29:00
- Last modified 20.04.2025 01:37:25
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Smart Licensing Manager service of the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges. The vulnerability is due to insufficient input validation of certain Smart Licensing configuration parameters. An authenticated attacker could exploit the vulnerability by configuring a malicious URL within the affected feature. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. This vulnerability affects the following Cisco Firepower Security products running FX-OS code trains 1.1.3, 1.1.4, and 2.0.1 (versions 2.1.1, 2.2.1, and 2.2.2 are not affected): Firepower 4100 Series Next-Generation Firewall and Firepower 9300 Security Appliance. Cisco Bug IDs: CSCvb86863.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Firepower Extensible Operating System Version <= 1.1.3
Cisco ≫ Firepower 4110 Next-generation Firewall Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Cisco ≫ Firepower Extensible Operating System Version1.1.4
Cisco ≫ Firepower 4110 Next-generation Firewall Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Cisco ≫ Firepower Extensible Operating System Version2.0.1
Cisco ≫ Firepower 4110 Next-generation Firewall Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Cisco ≫ Firepower 4120 Next-generation Firewall Version-
Cisco ≫ Firepower 4140 Next-generation Firewall Version-
Cisco ≫ Firepower 4150 Next-generation Firewall Version-
Cisco ≫ Firepower 9300 Security Appliance Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.55% | 0.669 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9 | 8 | 10 |
AV:N/AC:L/Au:S/C:C/I:C/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.