Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-12352

 

Privilege escalation in Cisco Application Policy Infrastructure Controller - CVE-2017-12352

Published: November 30, 2017 / Updated: December 1, 2017


Vulnerability identifier: #VU9511
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:U/U:Clear
CVE-ID: CVE-2017-12352
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Application Policy Infrastructure Controller

Detailed vulnerability description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists in certain system script files that are installed at boot time on Cisco Application Policy Infrastructure Controllers due to insufficient validation of user-controlled input. A local attacker can submit specially crafted input to a script file and execute arbitrary commands with root privileges.

Successful exploitation of the vulnerability may result in system compromise.


How to mitigate CVE-2017-12352

Update to version 3.1(0.84), 3.1(0.83a), 3.1(0.82a), 3.1(0.77a), 3.0(2h), 3.0(1.24), 3.0(1.22a).

Sources