Cisco Fog Director for IOx Arbitrary File Write Vulnerability
A vulnerability in the Cisco Fog Director for IOx could allow an authenticated, remote attacker to write a file to arbitrary locations.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file via the Cartridge interface. An exploit could allow the attacker to write or overwrite arbitrary files on an affected system.
Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2cNEiL5 A vulnerability in the Cisco Fog Director for IOx could allow an authenticated, remote attacker to write a file to arbitrary locations.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file via the Cartridge interface. An exploit could allow the attacker to write or overwrite arbitrary files on an affected system.
Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2cNEiL5
Security Impact Rating: Medium
CVE: CVE-2016-6405
from Cisco Security Advisory http://ift.tt/2cNEiL5
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file via the Cartridge interface. An exploit could allow the attacker to write or overwrite arbitrary files on an affected system.
Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2cNEiL5 A vulnerability in the Cisco Fog Director for IOx could allow an authenticated, remote attacker to write a file to arbitrary locations.
The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file via the Cartridge interface. An exploit could allow the attacker to write or overwrite arbitrary files on an affected system.
Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.
This advisory is available at the following link: http://ift.tt/2cNEiL5
Security Impact Rating: Medium
CVE: CVE-2016-6405
from Cisco Security Advisory http://ift.tt/2cNEiL5