#VU10121 Privilege escalation in Cisco Content Security Management Appliance and Cisco Email Security Appliance - CVE-2018-0095
Published: January 22, 2018
Vulnerability identifier: #VU10121
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0095
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Content Security Management Appliance
Cisco Email Security Appliance
Cisco Content Security Management Appliance
Cisco Email Security Appliance
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) due to an incorrect networking configuration at the administrative shell CLI. A local attacker can authenticate to the targeted device, issue a set of crafted, malicious commands at the administrative shell and gain root privileges.
The weakness exists in the administrative shell of the Cisco Email Security Appliance (ESA) and Content Security Management Appliance (SMA) due to an incorrect networking configuration at the administrative shell CLI. A local attacker can authenticate to the targeted device, issue a set of crafted, malicious commands at the administrative shell and gain root privileges.
Remediation
Install update from vendor's website.