Path traversal in Cisco IOx - CVE-2017-3851
Published: March 23, 2017 / Updated: June 8, 2017
Vulnerability identifier: #VU6161
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-3851
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco IOx
Cisco IOx
Detailed vulnerability description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the affected device.
The weakness exists due to directory traversal in the web framework code of the Cisco application-hosting framework (CAF) component. A remote user can send specially crafted requests to the CAF component and view arbitrary files on the target virtual instance running on the affected device.
Successful exploitation of the vulnerability results in information disclosure.
The weakness exists due to directory traversal in the web framework code of the Cisco application-hosting framework (CAF) component. A remote user can send specially crafted requests to the CAF component and view arbitrary files on the target virtual instance running on the affected device.
Successful exploitation of the vulnerability results in information disclosure.
How to mitigate CVE-2017-3851
Update to version 1.2.4.2.