Lucene search

K
cve[email protected]CVE-2017-6748
HistoryJul 25, 2017 - 7:29 p.m.

CVE-2017-6748

2017-07-2519:29:00
CWE-74
web.nvd.nist.gov
20
cisco
wsa
command injection
privilege escalation
cve-2017-6748
nvd
security vulnerability

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the CLI parser of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid operator-level or administrator-level credentials. Affected Products: virtual and hardware versions of Cisco Web Security Appliance (WSA). More Information: CSCvd88855. Known Affected Releases: 10.1.0-204. Known Fixed Releases: 10.5.1-270 10.1.1-234.

Affected configurations

NVD
Node
ciscoweb_security_applianceMatch10.0.0-232
OR
ciscoweb_security_applianceMatch10.0.0-233
OR
ciscoweb_security_applianceMatch10.0_base
OR
ciscoweb_security_applianceMatch10.1.0
OR
ciscoweb_security_applianceMatch10.1.0-204
OR
ciscoweb_security_applianceMatch10.1.1-230
OR
ciscoweb_security_applianceMatch10.5.0
OR
ciscoweb_security_applianceMatch10.5.0-358
OR
ciscoweb_security_applianceMatch11.0.0
OR
ciscoweb_security_applianceMatch11.0.0-613
OR
ciscoweb_security_virtual_applianceMatch10.0.0
OR
ciscoweb_security_virtual_applianceMatch10.0_base
OR
ciscoweb_security_virtual_applianceMatch10.1.0
OR
ciscoweb_security_virtual_applianceMatch10.1.1
OR
ciscoweb_security_virtual_applianceMatch10.1_base
OR
ciscoweb_security_virtual_applianceMatch10.5.1
OR
ciscoweb_security_virtual_applianceMatch10.5_base
OR
ciscoweb_security_virtual_applianceMatch11.0.0
OR
ciscoweb_security_virtual_applianceMatch11.0_base

CNA Affected

[
  {
    "product": "Cisco Web Security Appliance",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco Web Security Appliance"
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%