Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C48DC084-1DD2-4878-B1DB-1035CAE3B918", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CA9A904-9AB5-4757-ABD1-0F6F933799BE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "6B444DC9-BA6F-4159-A841-E8681DE3D38A", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "8FA8A21E-97BA-4326-9F7B-FCBD480134EF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "1E6FA3F5-752D-45AB-A8CB-6488F409D933", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4B80C9BA-07EC-4183-9AAD-3229913C9FD7", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "9B1895DF-AFB1-4B6E-A42C-38F7E19A5842", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "3BC4BC50-1D9C-42F3-A88F-FE1E2C8A6C76", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "FA671C18-10F2-4A45-8D1C-BF460ECA84B9", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F618372C-0913-4773-9267-A835F31FA776", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E66C4375-BC22-43C6-8028-AA7F6B8D82AE", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "507959BF-7A97-4037-954E-42D4EDAD93BF", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "77C1B418-2789-4A1B-843D-D36FD43FA434", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "85D4B5E7-0496-47A6-AEC5-B08C18FB7EDD", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C4712BD6-A0E5-476D-903A-3F83540A80EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "F214C934-BD71-4C2B-A9E0-140E2E9F42FB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "75C3114E-7453-42E5-B0E7-632635E4A54C", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B310B39B-7D5D-4533-9FE6-5F47985E35B0", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2720CCF-3B73-4268-94C7-9AE3D1ECAC75", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E7F9D72-0801-43B5-A64D-14E21DFC0851", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "46F5D443-3345-42B6-8EC9-5F010785D5A2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "95ECDC6B-C793-4015-A40F-152A840E6417", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "3FD13161-9DE7-4183-BBA3-877E83E9DD89", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "4AD40AE1-65C6-421B-93EB-12EEE1AF55DB", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "8B4E022B-7CC9-4CDC-BC75-FAAFD641A202", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "09489D1A-97AB-468F-AA47-33C23D08ED95", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "96E050F7-7AE7-4B3E-BAFA-4CE00F3DAEA3", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "395AD9EC-465B-47A9-8D7A-05C52CBD4509", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "2B019426-0625-4588-B0E1-94FD58F2BB65", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:meeting_server:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E377BED5-DC33-44C4-A75E-73971A13C211", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the CLI command-parsing code of Cisco Meeting Server could allow an authenticated, local attacker to perform command injection and escalate their privileges to root. The attacker must first authenticate to the application with valid administrator credentials. The vulnerability is due to insufficient validation of user-supplied input at the CLI for certain commands. An attacker could exploit this vulnerability by authenticating to the affected application and submitting a crafted CLI command for execution at the Cisco Meeting Server CLI. An exploit could allow the attacker to perform command injection and escalate their privilege level to root. Vulnerable Products: This vulnerability exists in Cisco Meeting Server software versions prior to and including 2.0, 2.1, and 2.2. Cisco Bug IDs: CSCvf53830."}, {"lang": "es", "value": "Una vulnerabilidad en el c\u00f3digo de an\u00e1lisis sint\u00e1ctico de comandos CLI de Cisco Meeting Server podr\u00eda permitir que un atacante local autenticado inyectase comandos y elevase sus privilegios a root. En primer lugar, el atacante debe autenticarse en la aplicaci\u00f3n con credenciales de administrador v\u00e1lidas. La vulnerabilidad se debe a la validaci\u00f3n insuficiente de entrada de datos de parte del usuario en el CLI para ciertos comandos. Un atacante podr\u00eda explotar esta vulnerabilidad autentic\u00e1ndose en la aplicaci\u00f3n afectada y enviando un comando CLI manipulado para ejecutarlo en el CLI de Cisco Meeting Server. Un exploit podr\u00eda permitir que el atacante realizase una inyecci\u00f3n de comandos y elevase su nivel de privilegios a root. Productos vulnerables: Esta vulnerabilidad existe en versiones de software Cisco Meeting Server anteriores a 2.0, 2.1 y 2.2 (estas, tambi\u00e9n incluidas). Cisco Bug IDs: CSCvf53830."}], "id": "CVE-2017-6794", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-09-07T21:29:00.910", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/100464"}, {"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039245"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170823-cms"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/100464"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039245"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170823-cms"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-20"}], "source": "psirt@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-20"}, {"lang": "en", "value": "CWE-77"}], "source": "nvd@nist.gov", "type": "Primary"}]}