CVE-2017-3851
Summary
| CVE | CVE-2017-3851 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-22 19:59:00 UTC |
| Updated | 2017-07-12 01:29:00 UTC |
| Description | A Directory Traversal vulnerability in the web framework code of the Cisco application-hosting framework (CAF) component of the Cisco IOx application environment could allow an unauthenticated, remote attacker to read any file from the CAF in the virtual instance running on the affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting crafted requests to the CAF web interface. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52302. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Application-Hosting Framework CVE-2017-3851 Directory Traversal Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco IOX for 800 Series Industrial Integrated Services Routers Input Validation Flaw Lets Remote Users Obtain Files on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Cisco IOx for Cisco ASR 1000 Series Routers Input Validation Flaw Lets Remote Users Obtain Files on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Cisco Application-Hosting Framework Directory Traversal Vulnerability | CONFIRM | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.