Vulnerability Details : CVE-2017-6667
A vulnerability in the update process for the dynamic JAR file of the Cisco Context Service software development kit (SDK) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected device with the privileges of the web server. More Information: CSCvb66730. Known Affected Releases: 2.0.
Vulnerability category: Input validationExecute code
Exploit prediction scoring system (EPSS) score for CVE-2017-6667
Probability of exploitation activity in the next 30 days: 0.69%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-6667
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-6667
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-6667
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs
Cisco Context Service SDK Arbitrary Code Execution VulnerabilityVendor Advisory
-
http://www.securityfocus.com/bid/98978
Cisco Context Service SDK CVE-2017-6667 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
Products affected by CVE-2017-6667
- cpe:2.3:a:cisco:context_service_development_kit:2.0:*:*:*:*:*:*:*