Cisco Security Advisory 2024年07月05日
Cisco Crosswork Network Services Orchestrator Privilege Escalation Vulnerability
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Cisco Crosswork Network Services Orchestrator (NSO) 的 Tail-f High Availability Cluster Communications (HCC) 功能包中存在一个漏洞,允许经过身份验证的本地攻击者将权限提升到受影响设备上的 root 用户。该漏洞的存在是因为应用程序使用用户控制的搜索路径来定位可执行文件。攻击者可以通过配置应用程序,使其执行恶意文件来利用此漏洞。成功利用此漏洞可以让攻击者以 root 用户身份在受影响设备上执行任意代码。要利用此漏洞,攻击者需要在受影响设备上拥有有效的凭据。

😈 **漏洞原理:** 该漏洞利用了 NSO HCC 功能包中用户控制的搜索路径,攻击者可以通过配置应用程序,使其执行恶意文件,从而利用此漏洞。

😈 **影响:** 攻击者可以利用此漏洞以 root 用户身份在受影响设备上执行任意代码,从而获得对设备的完全控制权。

😈 **修复措施:** Cisco 已发布了修复此漏洞的软件更新,建议用户尽快升级到最新版本。目前没有针对此漏洞的变通方法。

😈 **攻击条件:** 攻击者需要在受影响设备上拥有有效的凭据,才能利用此漏洞。

😈 **风险等级:** 该漏洞的风险等级为高,建议用户尽快采取措施进行修复。

😈 **建议:** 为了确保系统安全,建议用户尽快升级到最新版本的 NSO HCC 功能包,并定期检查系统安全状况。

😈 **参考:** https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D

A vulnerability in the Tail-f High Availability Cluster Communications (HCC) function pack of Cisco Crosswork Network Services Orchestrator (NSO) could allow an authenticated, local attacker to elevate privileges to root on an affected device.

This vulnerability exists because a user-controlled search path is used to locate executable files. An attacker could exploit this vulnerability by configuring the application in a way that causes a malicious file to be executed. A successful exploit could allow the attacker to execute arbitrary code on an affected device as the root user. To exploit this vulnerability, the attacker would need valid credentials on an affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-hcc-priv-esc-OWBWCs5D


Security Impact Rating: High
CVE: CVE-2024-20366

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Cisco NSO HCC 漏洞 提权 安全 CVE-2024-20366
相关文章