Cisco APIC SSH Privilege Escalation Vulnerabilit
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
Cisco | Cisco Application Policy Infrastructure Controller SSH Privilege Escalation Vulnerability | 16 Aug 201716:00 | – | cisco |
Tenable Nessus | Cisco Application Policy Infrastructure Controller SSH Privilege Escalation Vulnerability | 25 Aug 201700:00 | – | nessus |
CVE | CVE-2017-6767 | 17 Aug 201720:29 | – | cve |
Prion | Design/Logic Flaw | 17 Aug 201720:29 | – | prion |
NVD | CVE-2017-6767 | 17 Aug 201720:29 | – | nvd |
Cvelist | CVE-2017-6767 | 17 Aug 201720:00 | – | cvelist |
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:cisco:application_policy_infrastructure_controller";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.140306");
script_version("2024-09-13T05:05:46+0000");
script_tag(name:"last_modification", value:"2024-09-13 05:05:46 +0000 (Fri, 13 Sep 2024)");
script_tag(name:"creation_date", value:"2017-08-17 09:20:52 +0700 (Thu, 17 Aug 2017)");
script_tag(name:"cvss_base", value:"4.6");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:H/Au:S/C:P/I:P/A:P");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-03 00:03:00 +0000 (Thu, 03 Oct 2019)");
script_cve_id("CVE-2017-6767");
script_tag(name:"qod_type", value:"remote_banner");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Cisco Application Policy Infrastructure Controller SSH Privilege Escalation Vulnerability");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("CISCO");
script_dependencies("gb_cisco_apic_web_detect.nasl");
script_mandatory_keys("cisco/application_policy_infrastructure_controller/installed");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"summary", value:"A vulnerability in Cisco Application Policy Infrastructure Controller (APIC)
could allow an authenticated, remote attacker to gain higher privileges than the account is assigned. The attacker
will be granted the privileges of the last user to log in, regardless of whether those privileges are higher or
lower than what should have been granted. The attacker cannot gain root-level privileges.");
script_tag(name:"insight", value:"The vulnerability is due to a limitation with how Role-Based Access Control
(RBAC) grants privileges to remotely authenticated users when login occurs via SSH directly to the local
management interface of the APIC. An attacker could exploit this vulnerability by authenticating to the targeted
device. The attacker's privilege level will be modified to match that of the last user to log in via SSH.");
script_tag(name:"impact", value:"An exploit could allow the attacker to gain elevated privileges and perform
CLI commands that should be restricted by the attacker's configured role.");
script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");
script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-apic1");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE))
exit(0);
affected = make_list(
'1.0(1e)',
'1.0(1h)',
'1.0(1k)',
'1.0(1n)',
'1.0(2j)',
'1.0(2m)',
'1.0(3f)',
'1.0(3i)',
'1.0(3k)',
'1.0(3n)',
'1.0(4h)',
'1.0(4o)',
'1.1(0.920a)',
'1.1(1j)',
'1.1(3f)',
'1.2(2)',
'1.2(3)',
'1.2.2',
'1.3(1)',
'1.3(2)',
'1.3(2f)',
'2.0(1)');
foreach af (affected) {
if (version == af) {
report = report_fixed_ver(installed_version: version, fixed_version: "See advisory");
security_message(port: 0, data: report);
exit(0);
}
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo