Privilege escalation in Cisco Systems, Inc products - CVE-2017-12336

 

Privilege escalation in Cisco Systems, Inc products - CVE-2017-12336

Published: December 1, 2017


Vulnerability identifier: #VU9483
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12336
CWE-ID: CWE-77
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Nexus 9500 R-Series Line Cards and Fabric Modules
Nexus 7700 Series Switches
Nexus 7000 Series Switches
Nexus 6000 Series Switches
Nexus 5600 Platform Switches
Nexus 5500 Platform Switches
Nexus 5000 Series Switches
Nexus 2000 Series Fabric Extenders
Multilayer Director Switches
Nexus 3500 Series Switches

Detailed vulnerability description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the TCL scripting subsystem of Cisco NX-OS System Software due to insufficient input validation of user-supplied files passed to the interactive TCL shell. A local attacker with administrative or tclsh execution privileges can escape the interactive TCL shell, gain unauthorized access to the underlying operating system and execute arbitrary commands with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.

How to mitigate CVE-2017-12336

Install update from vendor's website.

Sources