First published: Thu Aug 17 2017(Updated: )
A vulnerability in the ConfD server of the Cisco Elastic Services Controller (ESC) could allow an authenticated, remote attacker to acquire sensitive system information. The vulnerability is due to insufficient protection of sensitive files on the system. An attacker could exploit this vulnerability by logging into the ConfD server and executing certain commands. An exploit could allow an unprivileged user to view configuration parameters that can be maliciously used. Cisco Bug IDs: CSCvd76409. Known Affected Releases: 2.3, 2.3(2).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =2.3 | |
Cisco Elastic Services Controller | =2.3\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6777 has been classified as a high severity vulnerability due to the potential exposure of sensitive system information.
To remediate CVE-2017-6777, upgrade to the latest version of the Cisco Elastic Services Controller.
CVE-2017-6777 affects users of Cisco Elastic Services Controller version 2.3.
An authenticated remote attacker can exploit CVE-2017-6777 to acquire sensitive system information due to insufficient protection of files.
Yes, Cisco has released a patch for CVE-2017-6777 that users should apply to mitigate the risk.