You are here
Home > Preporuke > Ranjivost Cisco Web Security Appliance proizvoda

Ranjivost Cisco Web Security Appliance proizvoda

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Web Security Appliance Command Injection and Privilege Escalation Vulnerability

Advisory ID: cisco-sa-20170719-wsa1

Revision: 1.0

For Public Release: 2017 July 19 16:00 GMT

Last Updated: 2017 July 19 16:00 GMT

CVE ID(s): CVE-2017-6746

CVSS Score v(3): 7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary
=======
A vulnerability in the web interface of the Cisco Web Security Appliance (WSA) could allow an authenticated, remote attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid administrator credentials.

The vulnerability is due to insufficient validation of user-supplied input on the web interface. An attacker could exploit this vulnerability by authenticating to the affected device and performing command injection over the web interface. An exploit could allow the attacker to elevate privileges from administrator to root.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa1 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-wsa1”]

—–BEGIN PGP SIGNATURE—–

iQKBBAEBAgBrBQJZb4VLZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg
SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx
NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnkgQ/+OczI8nJimFLZujvL
/X25Gt1HI3c9i6SvJlsyOTmxGrmF4L7orycJ3dHiagx5QWWSyX76lAVTiQsBrKXw
xAO2d48DEYQFNAZoeewl46wbeDDm8oj05nMAURcHeyMdqAHh4eplP+DYc55Jx/vm
0kPdcWzF7bkTXhPON5POYH/qQ/ll+27jaAq1RTHefs0fnLHgIqUReCisHYv/7NuE
32Jou33PHXkS0Mti0vKOjAXTr7Q0qsIzSMTgezY6kiFU2zOFpIhWWRKpK9QNGKcE
SNJqMBocS3bOEHbR0JSYPyUScH0ObcUCrqql3/FklSnwRhRDDRLEA+6+PTdmdfIi
u6gupGhVB+rSantjKSrHyAS6ck6gwXv9abWBKQBjvYSsR+qflElclFjaCka+Ogf9
h7xXEaUksor6hZMHm7izIfa2jt6GYnPkiVejRfe8N/3LAgTxirI8FsSjow+r9Av/
G02y+uts7ZwWsZWeWRIgBrdHNpYB4TLtnettU1C+B3efFXmsNRpgxOKcPQ1x+uOE
y6m5UpbeAZ/NtlTImtboszrl/t+5muEIR8UdxV4fRRx+zv57wW5RnpqSjTg24p16
/KvuXF2oreXunbn4/m3QP/3T1HkhNtCS4JYnsjIugJA9i5nvbBFNveE5yAfAN6R3
LDg8hlWY50d4F/kOjDumTaZqIQ4=
=cf9p
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-07-0134-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa putty

Otkriven je sigurnosni nedostatak u programskom paketu putty za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close