Overview
- Description
- A vulnerability in the Cisco Virtual Network Function (VNF) Element Manager could allow an authenticated, remote attacker to elevate privileges and run commands in the context of the root user on the server. The vulnerability is due to command settings that allow Cisco VNF Element Manager users to specify arbitrary commands that will run as root on the server. An attacker could use this setting to elevate privileges and run commands in the context of the root user on the server. Cisco Bug IDs: CSCvc76670. Known Affected Releases: prior to 5.0.4 and 5.1.4.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 8.5
- Impact score
- 9.2
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:virtual_network_function_element_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF9B8506-3299-4441-A13A-D7BE4D840689", "versionEndIncluding": "5.1.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:virtual_network_function_element_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA0EA90E-C0E1-4ECE-83E0-4CC1BDE3C2A7", "versionEndIncluding": "5.0.3" } ], "operator": "OR" } ] } ]