CVE-2006-1961
Summary
| CVE | CVE-2006-1961 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-04-21 10:02:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory. |
Risk And Classification
Primary CVSS: v2.0 7.5 from [email protected]
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS: 0.013080000 probability, percentile 0.798080000 (date 2026-04-20)
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cisco | Ciscoworks 2000 Service Management Solution | All | All | All | All |
| Operating System | Cisco | Ethernet Subscriber Solution Engine | All | All | All | All |
| Hardware | Cisco | Hosting Solution Engine | 1.7 | All | All | All |
| Hardware | Cisco | Hosting Solution Engine | 1.7.0 | All | All | All |
| Hardware | Cisco | Hosting Solution Engine | 1.7.1 | All | All | All |
| Hardware | Cisco | Hosting Solution Engine | 1.7.2 | All | All | All |
| Hardware | Cisco | Hosting Solution Engine | 1.7.3 | All | All | All |
| Application | Cisco | User Registration Tool | All | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.0 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.0 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.1 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.1 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.10 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.10 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.11 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.11 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.12 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.12 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.13 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.13 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.2 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.2 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.3 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.3 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.4 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.4 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.5 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.5 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.6 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.6 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.7 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.7 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.8 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.8 | All | express | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.9 | All | All | All |
| Application | Cisco | Wireless Lan Solution Engine | 2.9 | All | express | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.osvdb.org/24813 | af854a3a-2127-422b-91ae-364da2661108 | www.osvdb.org | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Cisco Hosting Solution Engine / User Registration Tool Privilege Escalation - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Page not found - CyberCX | Australia | af854a3a-2127-422b-91ae-364da2661108 | www.assurance.com.au | |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | Patch |
| Cisco WLSE Privilege Escalation and Cross-Site Scripting - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| CiscoWorks Wireless LAN Solution Engine Cross-Site Scripting Flaw Yields Administrative Privileges and Command Line Bug Lets Remote Authenticated Users Gain Shell Access - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | Patch |
| Cisco ESSE / SMS Privilege Escalation Vulnerability - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Cisco - Networking, Cloud, and Cybersecurity Solutions | af854a3a-2127-422b-91ae-364da2661108 | www.cisco.com | Patch |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Multiple Linux-Based Cisco Products Local Privilege Escalation Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.