First published: Thu Oct 19 2017(Updated: )
A vulnerability in the web interface of Cisco Network Analysis Module Software could allow an unauthenticated, remote attacker to delete arbitrary files from an affected system, aka Directory Traversal. The vulnerability exists because the affected software does not perform proper input validation of HTTP requests that it receives and the software does not apply role-based access controls (RBACs) to requested HTTP URLs. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected software. A successful exploit could allow the attacker to delete arbitrary files from the affected system. Cisco Bug IDs: CSCvf41365.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Virtual Network Analysis Module Software | =6.2\(1b\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12285 is rated as a high severity vulnerability due to its potential for unauthenticated remote file deletion.
To fix CVE-2017-12285, upgrade to a version of Cisco Prime Network Analysis Module Software that contains the security patch.
The vulnerability affects users of Cisco Prime Network Analysis Module Software version 6.2(1b) and potentially earlier versions.
An attacker exploiting CVE-2017-12285 can delete arbitrary files on the affected system without authentication.
Yes, CVE-2017-12285 is a remote vulnerability, which means it can be exploited from outside the network without physical access.