Privilege escalation in Elastic Services Controller - CVE-2017-6684

 

Privilege escalation in Elastic Services Controller - CVE-2017-6684

Published: June 9, 2017 / Updated: June 9, 2017


Vulnerability identifier: #VU6994
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6684
CWE-ID: CWE-259
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Elastic Services Controller

Detailed vulnerability description

The vulnerability allows a remote authenticated attacker to gain elevated privileges on the target system.

The weakness exists in Cisco Elastic Services Controllers on Linux systems due to existence of a default, weak, hard-coded password for the "admin" account of an affected system. A remote attacker can use default password to log in to the system as Linux "admin" user and gain "admin" privileges on the system.

Successful exploitation of the vulnerability results in "admin" access to the system.

How to mitigate CVE-2017-6684

Install update from vendor's website.

Sources