Cisco Prime Network Privilege Escalation Vulnerability
The vulnerability is due to the use of incorrect installation and permission settings for binary files when the affected software is installed on a device. An attacker could exploit this vulnerability by logging in to an affected system and elevating their privileges. A successful exploit could allow the attacker to gain root-level privileges and take full control of the affected system. The user must authenticate to an affected system with administrator credentials to exploit this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2tpF1Lb
The vulnerability is due to the use of incorrect installation and permission settings for binary files when the affected software is installed on a device. An attacker could exploit this vulnerability by logging in to an affected system and elevating their privileges. A successful exploit could allow the attacker to gain root-level privileges and take full control of the affected system. The user must authenticate to an affected system with administrator credentials to exploit this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2tpF1Lb
Security Impact Rating: Medium
CVE: CVE-2017-6732
from Cisco Security Advisory http://ift.tt/2tpF1Lb