First published: Thu Jul 06 2017(Updated: )
A vulnerability in certain commands of Cisco Elastic Services Controller could allow an authenticated, remote attacker to elevate privileges to root and run dangerous commands on the server. The vulnerability occurs because a "tomcat" user on the system can run certain shell commands, allowing the user to overwrite any file on the filesystem and elevate privileges to root. This vulnerability affects Cisco Elastic Services Controller prior to releases 2.3.1.434 and 2.3.2. Cisco Bug IDs: CSCvc76634.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =1.0.0 | |
Cisco Elastic Services Controller | =1.1.0 | |
Cisco Elastic Services Controller | =2.0 | |
Cisco Elastic Services Controller | =2.1.0 | |
Cisco Elastic Services Controller | =2.2.0 | |
Cisco Elastic Services Controller | =2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6712 is rated as high severity due to its potential for privilege escalation to root.
To fix CVE-2017-6712, upgrade to the latest version of Cisco Elastic Services Controller that is not affected by this vulnerability.
CVE-2017-6712 affects authenticated users of Cisco Elastic Services Controller versions 1.0.0, 1.1.0, and 2.x.
CVE-2017-6712 can be exploited by authenticated remote attackers to execute arbitrary commands with root privileges.
There are no official workarounds for CVE-2017-6712, and updating the software is the recommended approach.