Lucene search

K
ciscoCiscoCISCO-SA-APPD-PHP-AUTHPRIV-GEBWTVU5
HistoryNov 15, 2023 - 4:00 p.m.

Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability

2023-11-1516:00:00
tools.cisco.com
16
vulnerability
cisco
appdynamics
php
agent
privilege escalation
installer
script
authenticated
local attacker
permissions
exploit
software updates

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the installer script of Cisco AppDynamics PHP Agent could allow an authenticated, local attacker to elevate privileges on an affected device.

This vulnerability is due to insufficient permissions that are set by the PHP Agent Installer on the PHP Agent install directory. An attacker could exploit this vulnerability by modifying objects in the PHP Agent install directory, which would run with the same privileges as PHP. A successful exploit could allow a lower-privileged attacker to elevate their privileges to root on an affected device.

Cisco AppDynamics has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-php-authpriv-gEBwTvu5”]

Affected configurations

Vulners
Node
ciscoappdynamicsMatchany
OR
ciscoappdynamicsMatchany

6.9 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-APPD-PHP-AUTHPRIV-GEBWTVU5