First published: Tue Jun 13 2017(Updated: )
A vulnerability in the esc_listener.py script of Cisco Elastic Services Controllers could allow an authenticated, remote attacker to execute arbitrary commands as the tomcat user on an affected system, aka an Authentication Request Processing Arbitrary Command Execution Vulnerability. More Information: CSCvc76642. Known Affected Releases: 2.2(9.76).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =2.2\(9.76\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6683 has been rated as a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2017-6683, it is recommended to upgrade Cisco Elastic Services Controller to a version that is not affected by this vulnerability.
CVE-2017-6683 specifically affects Cisco Elastic Services Controller version 2.2(9.76).
CVE-2017-6683 allows an authenticated, remote attacker to execute arbitrary commands as the tomcat user on affected systems.
Yes, CVE-2017-6683 is a remote vulnerability that requires authentication to exploit.