First published: Thu Jun 07 2018(Updated: )
A vulnerability in the Disk Check Tool (disk-check.sh) for Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to elevate their privilege level to root. The attacker must have valid user credentials with super user privileges (level 15) to log in to the device. The vulnerability is due to insufficient validation of script files executed in the context of the Disk Check Tool. An attacker could exploit this vulnerability by replacing one script file with a malicious script file while the affected tool is running. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. Cisco Bug IDs: CSCvi72673.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wide Area Application Services | =6.2\(3\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0352 is classified as a high severity vulnerability that allows privilege escalation.
To mitigate CVE-2018-0352, update the Cisco Wide Area Application Services software to a version that contains the security fix.
CVE-2018-0352 affects users of Cisco Wide Area Application Services version 6.2(3) with authenticated access.
An authenticated, local attacker with super user privileges can exploit CVE-2018-0352 to gain root access.
CVE-2018-0352 allows an attacker to elevate their privilege level to root on the affected Cisco WAAS system.