First published: Thu Aug 17 2017(Updated: )
A vulnerability in Cisco Elastic Services Controller could allow an authenticated, local, unprivileged attacker to access sensitive information, including credentials for system accounts, on an affected system. The vulnerability is due to improper protection of sensitive log files. An attacker could exploit this vulnerability by logging in to an affected system and accessing unprotected log files. A successful exploit could allow the attacker to access sensitive log files, which may include system credentials, on the affected system. Cisco Bug IDs: CSCvc76616. Known Affected Releases: 2.2(9.76).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Elastic Services Controller | =2.2\(9.76\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6786 is classified as a medium severity vulnerability.
To remediate CVE-2017-6786, update the Cisco Elastic Services Controller to version 2.2(9.77) or later.
CVE-2017-6786 affects Cisco Elastic Services Controller version 2.2(9.76).*.
CVE-2017-6786 requires local access and authentication, so it cannot be exploited remotely.
CVE-2017-6786 may allow access to sensitive information, including credentials for system accounts.