CVE-2017-6662 (CNNVD-201706-953)
中文标题:
Cisco Prime Infrastructure和Evolved Programmable Network Manager 安全漏洞
英文标题:
A vulnerability in the web-based user interface of Cisco Prime Infrastructure (PI) and Evolved Progr...
漏洞描述
中文描述:
Cisco Prime Infrastructure(PI)和Cisco Evolved Programmable Network Manager(EPNM)都是美国思科(Cisco)公司的产品。PI是一套通过Cisco Prime LAN Management Solution(LMS)和Cisco Prime Network Control System(NCS)技术进行无线管理的解决方案;EPNM是一套网络管理解决方案。 Cisco PI和EPNM中的基于Web的用户界面存在XML外部实体注入漏洞,该漏洞源于程序没有正确的处理XML外部实体。远程攻击者可通过诱使管理员导入特制的XML文件利用该漏洞读取和写入文件,在应用程序中执行代码。以下产品和版本受到影响:Cisco Prime Infrastructure 1.1版本至3.1.6版本;Evolved Programmable Network Manager 1.2版本,2.0版本,2.1版本。
英文描述:
A vulnerability in the web-based user interface of Cisco Prime Infrastructure (PI) and Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker read and write access to information stored in the affected system as well as perform remote code execution. The attacker must have valid user credentials. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file with malicious entries which could allow the attacker to read and write files and execute remote code within the application, aka XML Injection. Cisco Prime Infrastructure software releases 1.1 through 3.1.6 are vulnerable. Cisco EPNM software releases 1.2, 2.0, and 2.1 are vulnerable. Cisco Bug IDs: CSCvc23894 CSCvc49561.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | evolved_programmable_network_manager | 1.2.0 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.0:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 1.2.1.3 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.1.3:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 1.2.200 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.200:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 1.2.300 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.300:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 1.2.400 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.400:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 1.2.500 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.500:*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 2.0\(4.0.45d\) | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0\(4.0.45d\):*:*:*:*:*:*:*
|
| cisco | evolved_programmable_network_manager | 2.0.0 | - | - |
cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.0:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.2 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.2:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.2.0.103 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.2.0.103:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.2.1 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.2.1:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.3 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.3:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.3.0.20 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.3.0.20:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.4 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.4:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.4.0.45 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.4.0.45:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.4.1 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.4.1:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 1.4.2 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:1.4.2:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 2.0 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:2.0:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 2.1.0 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 2.2 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 2.2\(2\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:2.2\(2\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 2.2\(3\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:2.2\(3\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.0 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.0:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.1 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.1:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.1\(0.128\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.1\(0.128\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.1\(4.0\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.1\(4.0\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.1\(5.0\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.1\(5.0\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.1.1 | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.1.1:*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.2\(0.0\) | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.2\(0.0\):*:*:*:*:*:*:*
|
| cisco | prime_infrastructure | 3.2_base | - | - |
cpe:2.3:a:cisco:prime_infrastructure:3.2_base:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2017-6662 |
2025-11-11 15:19:31 | 2025-11-11 07:34:51 |
| NVD | nvd_CVE-2017-6662 |
2025-11-11 14:55:29 | 2025-11-11 07:43:28 |
| CNNVD | cnnvd_CNNVD-201706-953 |
2025-11-11 15:09:50 | 2025-11-11 07:53:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 代码问题
- cnnvd_id: 未提取 -> CNNVD-201706-953
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 8.0
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 30
- data_sources: ['cve'] -> ['cve', 'nvd']