Privilege escalation in Cisco Systems, Inc products - CVE-2017-12329
Published: December 1, 2017
Vulnerability identifier: #VU9487
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12329
CWE-ID: CWE-77
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Nexus 9500 R-Series Line Cards and Fabric Modules
Nexus 9000 Series Fabric Switches
Nexus 7700 Series Switches
Nexus 7000 Series Switches
Nexus 6000 Series Switches
Nexus 5600 Platform Switches
Nexus 5500 Platform Switches
Nexus 5000 Series Switches
Nexus 2000 Series Fabric Extenders
Multilayer Director Switches
Nexus 3500 Series Switches
Nexus 9500 R-Series Line Cards and Fabric Modules
Nexus 9000 Series Fabric Switches
Nexus 7700 Series Switches
Nexus 7000 Series Switches
Nexus 6000 Series Switches
Nexus 5600 Platform Switches
Nexus 5500 Platform Switches
Nexus 5000 Series Switches
Nexus 2000 Series Fabric Extenders
Multilayer Director Switches
Nexus 3500 Series Switches
Detailed vulnerability description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the CLI due to insufficient input validation of command arguments to the CLI parser. A local attacker can inject specially crafted command arguments into a vulnerable CLI command and execute arbitrary commands at the user's privilege level.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists in the CLI due to insufficient input validation of command arguments to the CLI parser. A local attacker can inject specially crafted command arguments into a vulnerable CLI command and execute arbitrary commands at the user's privilege level.
Successful exploitation of the vulnerability may result in system compromise.
How to mitigate CVE-2017-12329
Install update from vendor's website.