René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

119 lines
4.5 KiB
JSON

{
"id": "CVE-2017-6709",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-07-06T00:29:00.427",
"lastModified": "2019-10-09T23:28:56.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the AutoVNF tool for the Cisco Ultra Services Framework could allow an unauthenticated, remote attacker to access administrative credentials for Cisco Elastic Services Controller (ESC) and Cisco OpenStack deployments in an affected system. The vulnerability exists because the affected software logs administrative credentials in clear text for Cisco ESC and Cisco OpenStack deployment purposes. An attacker could exploit this vulnerability by accessing the AutoVNF URL for the location where the log files are stored and subsequently accessing the administrative credentials that are stored in clear text in those log files. This vulnerability affects all releases of the Cisco Ultra Services Framework prior to Releases 5.0.3 and 5.1. Cisco Bug IDs: CSCvc76659."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la herramienta AutoVNF para el Framework Ultra Services de Cisco, podr\u00eda permitir a un atacante remoto no autenticado acceder a las credenciales administrativas de las implementaciones de Elastic Services Controller (ESC) y OpenStack de Cisco, en un sistema afectado. La vulnerabilidad se debido a que el software afectado registra las credenciales administrativas en texto sin cifrar para los prop\u00f3sitos de implementaci\u00f3n de ESC y OpenStack de Cisco. Un atacante podr\u00eda explotar esta vulnerabilidad accediendo a la URL de AutoVNF para la ubicaci\u00f3n donde se almacenan los archivos de registro y posteriormente acceder a las credenciales administrativas que est\u00e1n almacenadas en texto sin cifrar en esos archivos de registro. Esta vulnerabilidad afecta a todas las versiones de Framework Ultra Services anteriores a las 5.0.3 y 5.1 de Cisco. ID de BUG de Cisco: CSCvc76659."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
},
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ultra_services_framework:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.0.2",
"matchCriteriaId": "9750B831-5B32-4889-B712-EA8A15D1D225"
}
]
}
]
}
],
"references": [
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-usf2",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}