René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

112 lines
4.1 KiB
JSON

{
"id": "CVE-2017-6786",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2017-08-17T20:29:00.887",
"lastModified": "2017-08-24T16:24:52.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Elastic Services Controller could allow an authenticated, local, unprivileged attacker to access sensitive information, including credentials for system accounts, on an affected system. The vulnerability is due to improper protection of sensitive log files. An attacker could exploit this vulnerability by logging in to an affected system and accessing unprotected log files. A successful exploit could allow the attacker to access sensitive log files, which may include system credentials, on the affected system. Cisco Bug IDs: CSCvc76616. Known Affected Releases: 2.2(9.76)."
},
{
"lang": "es",
"value": "Una vulnerabilidad en Cisco Elastic Services Controller podr\u00eda permitir que un usuario local, autenticado y sin privilegios acceda a informaci\u00f3n sensible, incluyendo las credenciales para cuentas del sistema, en un sistema afectado. Esta vulnerabilidad se debe a una protecci\u00f3n inadecuada de archivos de registro sensibles. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en un sistema afectado y accediendo a los archivos de registro sin protecci\u00f3n. Si se explota esta vulnerabilidad con \u00e9xito, podr\u00eda permitir que el atacante acceda a archivos de registro sensibles, que podr\u00edan incluir credenciales del sistema, en el sistema afectado. Cisco Bug IDs: CSCvc76616. Versiones afectadas conocidas: 2.2(9,76)."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 3.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:elastic_services_controller:2.2\\(9.76\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E20A8B43-6D8F-468D-8194-0D8125742D39"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/100391",
"source": "ykramarz@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-esc4",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}