CVE-2017-6667

A vulnerability in the update process for the dynamic JAR file of the Cisco Context Service software development kit (SDK) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected device with the privileges of the web server. More Information: CSCvb66730. Known Affected Releases: 2.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:context_service_development_kit:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98978 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98978 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs - Vendor Advisory

Information

Published : 2017-06-13 06:29

Updated : 2024-11-21 03:30


NVD link : CVE-2017-6667

Mitre link : CVE-2017-6667

CVE.ORG link : CVE-2017-6667


JSON object : View

Products Affected

cisco

  • context_service_development_kit
CWE
CWE-20

Improper Input Validation