First published: Thu Sep 21 2017(Updated: )
A vulnerability in the CLI of Cisco UCS Central Software could allow an authenticated, local attacker to gain shell access. The vulnerability is due to insufficient input validation of commands entered in the CLI, aka a Restricted Shell Break Vulnerability. An attacker could exploit this vulnerability by entering a specific command with crafted arguments. An exploit could allow the attacker to gain shell access to the underlying system. Cisco Bug IDs: CSCve70762.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System software | =1.5\(1c\) | |
Cisco Unified Computing System software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12255 is considered a high severity vulnerability due to the potential for an authenticated attacker to gain shell access.
To fix CVE-2017-12255, update to a patched version of Cisco UCS Central Software as recommended in Cisco's security advisory.
Cisco UCS Central Software versions prior to 1.5(1c) are affected by CVE-2017-12255.
The potential risks associated with CVE-2017-12255 include unauthorized access to the shell, which could lead to further exploitation of the system.
CVE-2017-12255 is not exploitable remotely as it requires an authenticated local user to exploit the vulnerability.