Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Cisco Cloud Services Router 1000V Command Injection Vulnerability

Information

Severity

Severity

High

Family

Family

CISCO

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Workaround

Created

Created

6 years ago

Modified

Modified

3 years ago

Summary

A vulnerability in the event manager environment and publish-event function of the Cisco Cloud Services Router 1000V Series could allow an authenticated, local attacker to perform a command injection attack with root-level privileges.

Insight

Insight

The vulnerability is due to a lack of proper input validation of event manager environment variables that are configured on the affected device. An attacker could exploit this vulnerability by authenticating to the device with administrative privileges, modifying the configuration of the device, and then invoking a crafted event manager script. A successful exploit could allow the attacker to compromise the affected system using commands that are executed with root-level privileges.

Affected Software

Affected Software

Cisco Cloud Services Router 1000V Series running Cisco IOS software versions 15.5(2)S and 15.5(3)S.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

See vendor advisory for a solution

Common Vulnerabilities and Exposures (CVE)