Privilege escalation in Elastic Services Controller - CVE-2017-6689

 

Privilege escalation in Elastic Services Controller - CVE-2017-6689

Published: June 9, 2017 / Updated: June 9, 2017


Vulnerability identifier: #VU6992
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6689
CWE-ID: CWE-259
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Elastic Services Controller

Detailed vulnerability description

The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.

The weakness exists in the ConfD CLI of Cisco Elastic Services Controllers due to existence of a default, weak, hard-coded password for the "admin" account of an affected system. A remote attacker can use Secure Shell (SSH) on TCP port 2024 and default password to log in to the system as "admin" user and gain "admin" privileges on the system.

Successful exploitation of the vulnerability results in "admin" access to the system.

How to mitigate CVE-2017-6689

Install update from vendor's website.

Sources