Lucene search

K
ciscoCiscoCISCO-SA-20150917-CVE-2015-6296
HistorySep 17, 2015 - 9:02 p.m.

Cisco Prime Network Registrar Privilege Escalation Vulnerability

2015-09-1721:02:42
tools.cisco.com
19

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the default configuration of the Cisco Prime Network Registrar (CPNR) virtual appliance (OVA) which could allow an authenticated, local attacker to gain root privileges.

The vulnerability is due to an insecure default account present on the affected device. A local attacker could exploit the vulnerability by using the insecure default account to gain additional privileges on the affected device. If successful, the attacker could gain root privileges and possibly compromise the affected device.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, an attacker must authenticate to the targeted device with local account access. This access requirement reduces the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoprime_network_registrarMatchany
OR
ciscoprime_network_registrarMatchany
VendorProductVersionCPE
ciscoprime_network_registraranycpe:2.3:a:cisco:prime_network_registrar:any:*:*:*:*:*:*:*

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20150917-CVE-2015-6296