Vulnerability Details : CVE-2006-1961
Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13, Hosting Solution Engine (HSE) and User Registration Tool (URT) before 20060419, and all versions of Ethernet Subscriber Solution Engine (ESSE) and CiscoWorks2000 Service Management Solution (SMS) allow local users to gain Linux shell access via shell metacharacters in arguments to the "show" command in the application's command line interface (CLI), aka bug ID CSCsd21502 (WLSE), CSCsd22861 (URT), and CSCsd22859 (HSE). NOTE: other issues might be addressed by the Cisco advisory.
Products affected by CVE-2006-1961
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:express:*:*:*:*:*
- cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:hosting_solution_engine:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:hosting_solution_engine:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:hosting_solution_engine:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:hosting_solution_engine:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:hosting_solution_engine:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:user_registration_tool:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:ciscoworks_2000_service_management_solution:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ethernet_subscriber_solution_engine:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1961
1.31%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1961
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-1961
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25884
-
http://www.cisco.com/warp/public/707/cisco-sr-20060419-priv.shtml
Patch
-
http://www.securityfocus.com/archive/1/431367/30/5490/threaded
-
http://www.vupen.com/english/advisories/2006/1434
-
http://www.securityfocus.com/archive/1/431371/30/5490/threaded
-
http://www.securityfocus.com/bid/17609
-
http://secunia.com/advisories/19739
-
http://www.cisco.com/warp/public/707/cisco-sa-20060419-wlse.shtml
Patch
-
http://securitytracker.com/id?1015965
Patch
-
http://www.osvdb.org/24813
-
http://www.vupen.com/english/advisories/2006/1435
-
http://secunia.com/advisories/19736
Patch;Vendor Advisory
-
http://secunia.com/advisories/19741
-
http://www.assurance.com.au/advisories/200604-cisco.txt
Jump to