Lucene search

K
ciscoCiscoCISCO-SA-20150605-CVE-2015-0767
HistoryJun 05, 2015 - 12:35 a.m.

Cisco Edge 340 Privilege Escalation Vulnerability

2015-06-0500:35:20
tools.cisco.com
21

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the system configuration of Cisco Edge 340 could allow an authenticated, local attacker to run arbitrary programs with elevated privileges.

The vulnerability is due to insufficient access control protections. An attacker could exploit this vulnerability by logging in to the system and executing commands that could lead to elevated privileges. An exploit could allow the attacker to execute commands as the root system user.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. This access requirement decreases the likelihood of a successful exploit.

Affected configurations

Vulners
Node
cisco300_series_managed_switchesMatchany
OR
ciscoedge_340_firmwareMatch300_series

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20150605-CVE-2015-0767