A vulnerability in the Cisco Fog Director for IOx could allow an authenticated, remote malicious user to write a file to arbitrary locations. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by uploading a crafted file via the Cartridge interface. An exploit could allow the malicious user to write or overwrite arbitrary files on an affected system. Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160914-ioxfd
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco fog director 1.0\\(0\\) |