First published: Mon Dec 26 2016(Updated: )
A vulnerability in the Docker Engine configuration of Cisco CloudCenter Orchestrator (CCO; formerly CliQr) could allow an unauthenticated, remote attacker to install Docker containers with high privileges on the affected system. Affected Products: This vulnerability affect all releases of Cisco CloudCenter Orchestrator (CCO) deployments where the Docker Engine TCP port 2375 is open on the system and bound to local address 0.0.0.0 (any interface).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco CloudCenter | =4.4.0 | |
Cisco CloudCenter | =4.5.0 | |
Cisco CloudCenter | =4.6.0 | |
Cisco CloudCenter | =4.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9223 is classified as a critical severity vulnerability due to its potential for unauthorized access and control.
To fix CVE-2016-9223, it is recommended to upgrade to the latest version of Cisco CloudCenter Orchestrator that addresses this vulnerability.
The potential impacts of CVE-2016-9223 include unauthorized installation of Docker containers with high privileges, leading to system compromise.
CVE-2016-9223 affects Cisco CloudCenter Orchestrator versions 4.4.0, 4.5.0, 4.6.0, and 4.6.1.
Yes, CVE-2016-9223 can be exploited by unauthenticated remote attackers.