A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101652 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039719 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-arce | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2017-11-02 16:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-12243
Mitre link : CVE-2017-12243
CVE.ORG link : CVE-2017-12243
JSON object : View
Products Affected
cisco
- unified_computing_system_manager
- firepower_4120_next-generation_firewall
- firepower_4100_next-generation_firewall_firmware
- firepower_4150_next-generation_firewall
- firepower_4140_next-generation_firewall
- firepower_4110_next-generation_firewall
- firepower_9300_security_appliance_firmware
- unified_computing_system_manager_firmware
- firepower_9300_security_appliance
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')