CVE-2017-12243
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
02/11/2017
Last modified:
20/04/2025
Description
A vulnerability in the Cisco Unified Computing System (UCS) Manager, Cisco Firepower 4100 Series Next-Generation Firewall (NGFW), and Cisco Firepower 9300 Security Appliance could allow an authenticated, local attacker to obtain root shell privileges on the device, aka Command Injection. The vulnerability is due to improper validation of string input in the shell application. An attacker could exploit this vulnerability through the use of malicious commands. A successful exploit could allow the attacker to obtain root shell privileges on the device. Cisco Bug IDs: CSCvf20741, CSCvf60078.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:unified_computing_system_manager_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:unified_computing_system_manager:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:firepower_9300_security_appliance_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_9300_security_appliance:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:firepower_4100_next-generation_firewall_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4110_next-generation_firewall:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4120_next-generation_firewall:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4140_next-generation_firewall:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:firepower_4150_next-generation_firewall:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/101652
- http://www.securitytracker.com/id/1039719
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-arce
- http://www.securityfocus.com/bid/101652
- http://www.securitytracker.com/id/1039719
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-arce



