First published: Thu Nov 02 2017(Updated: )
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System Manager Firmware | ||
Cisco Unified Computing System Manager | ||
Cisco Firepower 9300 Security Appliance Firmware | ||
Cisco Firepower 9300 Security Appliance | ||
Cisco Firepower 4100 Next-generation Firewall Firmware | ||
Cisco Firepower 4110 Next-generation Firewall | ||
Cisco Firepower 4120 Next-generation Firewall | ||
Cisco Firepower 4140 Next-generation Firewall | ||
Cisco Firepower 4150 Next-generation Firewall |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12243 is high, with a severity value of 7.8.
An attacker can exploit CVE-2017-12243 by obtaining root shell privileges on the affected devices through command injection.
Cisco Unified Computing System Manager Firmware, Cisco Firepower 9300 Security Appliance Firmware, and Cisco Firepower 4100 Next-generation Firewall Firmware are affected by CVE-2017-12243.
Apply the necessary updates or patches provided by Cisco to fix CVE-2017-12243.
You can find more information about CVE-2017-12243 on the following sources: SecurityFocus BID, SecurityTracker, and the Cisco Security Advisory.