CVE-2018-0352 (CNNVD-201806-364)
中文标题:
Cisco Wide Area Application Services Software Disk Check Tool 权限许可和访问控制漏洞
英文标题:
A vulnerability in the Disk Check Tool (disk-check.sh) for Cisco Wide Area Application Services (WAA...
漏洞描述
中文描述:
Cisco Wide Area Application Services(WAAS)Software是美国思科(Cisco)公司的一套广域网链路加速软件。Disk Check Tool(disk-check.sh)是其中的一个磁盘检查工具。 Cisco WAAS Software中的Disk Check Tool(disk-check.sh)中存在提权漏洞,该漏洞源于程序没有充分的验证在Disk Check Tool上下文中运行的脚本文件。本地攻击者可通过在该受影响工具运行时,用恶意的脚本文件替换掉其中的脚本文件利用该漏洞获取root级别权限并完全控制设备。
英文描述:
A vulnerability in the Disk Check Tool (disk-check.sh) for Cisco Wide Area Application Services (WAAS) Software could allow an authenticated, local attacker to elevate their privilege level to root. The attacker must have valid user credentials with super user privileges (level 15) to log in to the device. The vulnerability is due to insufficient validation of script files executed in the context of the Disk Check Tool. An attacker could exploit this vulnerability by replacing one script file with a malicious script file while the affected tool is running. A successful exploit could allow the attacker to gain root-level privileges and take full control of the device. Cisco Bug IDs: CSCvi72673.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | wide_area_application_services | 6.2\(3\) | - | - |
cpe:2.3:a:cisco:wide_area_application_services:6.2\(3\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-0352 |
2025-11-11 15:19:35 | 2025-11-11 07:34:57 |
| NVD | nvd_CVE-2018-0352 |
2025-11-11 14:55:55 | 2025-11-11 07:43:33 |
| CNNVD | cnnvd_CNNVD-201806-364 |
2025-11-11 15:10:02 | 2025-11-11 07:53:47 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-201806-364
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.7
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 1
- data_sources: ['cve'] -> ['cve', 'nvd']