Lucene search

K
ciscoCiscoCISCO-SA-20150826-CVE-2015-6265
HistoryAug 26, 2015 - 9:09 p.m.

Cisco ACE 4710 and ACE30 Application Control Engine CLI Privilege Escalation Vulnerability

2015-08-2621:09:19
tools.cisco.com
22

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

26.0%

A vulnerability in the command-line interface (CLI) of Cisco Application Control Engine (ACE) could allow an authenticated, local attacker to elevate privileges to read and alter the content of files that belong to other contexts.

The vulnerability is due to insufficient file access controls. An attacker could exploit this vulnerability by crafting a malicious file, copying it to the ACE, and using the file as input for a specific CLI command.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker must authenticate to the targeted device and have local network access. These access requirements may reduce the likelihood of a successful exploit.

Cisco would like to thank Jens Krabbenhoeft of Rauscher networX for reporting this vulnerability.

Affected configurations

Vulners
Node
ciscoace_4700_series_application_control_engine_applianceMatchany
OR
ciscoace_4710Match4700_series_application_control_engine_appliances

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

26.0%

Related for CISCO-SA-20150826-CVE-2015-6265