First published: Wed Aug 04 2021(Updated: )
A vulnerability in Cisco Network Services Orchestrator (NSO) could allow an authenticated, local attacker to execute arbitrary commands at the level of the account under which Cisco NSO is running, which is root by default. To exploit this vulnerability, an attacker must have a valid
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Crosswork Network Services Orchestrator | =5.8<5.8.11=5.7<5.7.13>=5.4=5.5<=5.6<5.6.14.1 | 5.8.11 5.7.13 5.6.14.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nso-priv-esc-XXqRtTfT is high, as it allows authenticated local attackers to execute arbitrary commands.
To fix cisco-sa-nso-priv-esc-XXqRtTfT, update your Cisco NSO to one of the fixed versions, which include 5.8.11, 5.7.13, or 5.6.14.1.
Cisco NSO users running versions prior to 5.8.11, 5.7.13, or 5.6.14.1 are affected by cisco-sa-nso-priv-esc-XXqRtTfT.
An authenticated local attacker can exploit the cisco-sa-nso-priv-esc-XXqRtTfT vulnerability to execute commands with root privileges.
Cisco Network Services Orchestrator (NSO) is the product impacted by the cisco-sa-nso-priv-esc-XXqRtTfT vulnerability.