7.2
CVSSv2

CVE-2015-4186

Published: 17/06/2015 Updated: 07/12/2016
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the diagnostics portion of the administrative web interface of Cisco Virtualization Experience (VXC) Client 6215 devices could allow an authenticated, local malicious user to execute arbitrary commands on the underlying operating system with elevated privileges. The vulnerability is due to a failure to properly sanitize input passed to a specific diagnostics option. An attacker could exploit this by supplying crafted input designed to bypass the input filter and execute arbitrary commands on the underlying operating system with root privileges. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These requirements may reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco virtualization experience client 6000 series firmware 11.2\\(27.4\\)

Vendor Advisories

A vulnerability in the diagnostics portion of the administrative web interface of Cisco Virtualization Experience (VXC) Client 6215 devices could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with elevated privileges The vulnerability is due to a failure to properly sanitize input passed t ...