Privilege escalation in Cisco Content Security Management Appliance and Cisco Email Security Appliance - CVE-2018-0095
Published: January 22, 2018
Vulnerability identifier: #VU10121
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0095
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Content Security Management Appliance
Cisco Email Security Appliance
Cisco Content Security Management Appliance
Cisco Email Security Appliance
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) due to an incorrect networking configuration at the administrative shell CLI. A local attacker can authenticate to the targeted device, issue a set of crafted, malicious commands at the administrative shell and gain root privileges.
The weakness exists in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) due to an incorrect networking configuration at the administrative shell CLI. A local attacker can authenticate to the targeted device, issue a set of crafted, malicious commands at the administrative shell and gain root privileges.
How to mitigate CVE-2018-0095
Install update from vendor's website.