First published: Wed Mar 02 2022(Updated: )
A vulnerability in the Common Execution Environment (CEE) ConfD CLI of Cisco Ultra Cloud Core - Subscriber Microservices Infrastructure (SMI) software could allow an authenticated, local attacker to escalate privileges on an affected device. This vulnerability is due to insufficient access control in the affected CLI. An attacker could exploit this vulnerability by authenticating as a CEE ConfD CLI user and executing a specific CLI command. A successful exploit could allow an attacker to access privileged containers with root privileges. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-uccsmi-prvesc-BQHGe4cm
Credit: by Andrew Kim the Cisco Advanced Security Initiatives Group
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Ultra Cloud Core | >=2020.02.6<=2020.02.7<2020.02.7.07=2020.02.2<2020.02.2.47 | 2020.02.7.07 2020.02.2.47 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-uccsmi-prvesc-BQHGe4cm is high due to the potential for privilege escalation.
To fix cisco-sa-uccsmi-prvesc-BQHGe4cm, you should update the Cisco Ultra Cloud Core SMI software to a patched version.
Versions from 2020.02.6 up to and including 2020.02.7 are affected by cisco-sa-uccsmi-prvesc-BQHGe4cm.
Authenticated, local attackers on affected devices are vulnerable to cisco-sa-uccsmi-prvesc-BQHGe4cm.
cisco-sa-uccsmi-prvesc-BQHGe4cm is associated with privilege escalation attacks.