A vulnerability in the update process for the dynamic JAR file of the Cisco Context Service software development kit (SDK) could allow an unauthenticated, remote attacker to execute arbitrary code on the affected device with the privileges of the web server. More Information: CSCvb66730. Known Affected Releases: 2.0.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98978 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs | Vendor Advisory |
http://www.securityfocus.com/bid/98978 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs | Vendor Advisory |
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98978 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-ccs - Vendor Advisory |
Information
Published : 2017-06-13 06:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6667
Mitre link : CVE-2017-6667
CVE.ORG link : CVE-2017-6667
JSON object : View
Products Affected
cisco
- context_service_development_kit
CWE
CWE-20
Improper Input Validation