First published: Thu May 17 2018(Updated: )
A vulnerability in the web management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a path traversal attack on a targeted system. The vulnerability is due to insufficient validation of web request parameters. An attacker who has access to the web management interface of the affected application could exploit this vulnerability by sending a malicious web request to the affected device. A successful exploit could allow the attacker to access sensitive information on the affected system. Cisco Bug IDs: CSCvh99631.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Enterprise Network Functions Virtualization Infrastructure Software | =3.6.1 | |
Cisco Enterprise Network Functions Virtualization Infrastructure Software | =3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0323 has been classified as a high severity vulnerability due to its potential impact on system security.
To remediate CVE-2018-0323, update to Cisco Enterprise NFV Infrastructure Software version 3.7.2 or later.
CVE-2018-0323 affects users of Cisco Enterprise NFV Infrastructure Software versions 3.6.1 and 3.7.1.
CVE-2018-0323 allows an authenticated remote attacker to perform a path traversal attack.
CVE-2018-0323 exploits insufficient validation of web request parameters in the web management interface.