VAR-201506-0159
Vulnerability from variot - Updated: 2025-04-12 23:36Cisco Edge 300 software 1.0 and 1.1 on Edge 340 devices allows local users to obtain root privileges via unspecified commands, aka Bug ID CSCur18132. Successful exploits will result in the complete compromise of affected computers. This issue is being tracked by Cisco Bug ID CSCur18132. The former is a digital signage multimedia player device; the latter is a 300 series intelligent open access platform integrating wireless and switch functions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201506-0159",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "edge 340",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.0.0"
},
{
"model": "edge 340",
"scope": "eq",
"trust": 1.6,
"vendor": "cisco",
"version": "1.1.0"
},
{
"model": "edge 340",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "edge 340",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1.0 (cisco edge 300 series software )"
},
{
"model": "edge 340",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "1.1 (cisco edge 300 series software )"
},
{
"model": "edge series",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3001.0.0"
},
{
"model": "edge series",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "3001.1.0"
},
{
"model": "edge series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3400"
},
{
"model": "edge series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.1"
},
{
"model": "edge series",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "3001.0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "BID",
"id": "75027"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:cisco:edge_340",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:cisco:edge_340_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "75027"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0767",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2015-0767",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.1,
"id": "CNVD-2015-03752",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-78713",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2015-0767",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2015-0767",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2015-03752",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201506-098",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-78713",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2015-0767",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Edge 300 software 1.0 and 1.1 on Edge 340 devices allows local users to obtain root privileges via unspecified commands, aka Bug ID CSCur18132. Successful exploits will result in the complete compromise of affected computers. \nThis issue is being tracked by Cisco Bug ID CSCur18132. The former is a digital signage multimedia player device; the latter is a 300 series intelligent open access platform integrating wireless and switch functions",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0767"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "BID",
"id": "75027"
},
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0767",
"trust": 3.5
},
{
"db": "BID",
"id": "75027",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-03752",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-78713",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2015-0767",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"db": "BID",
"id": "75027"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"id": "VAR-201506-0159",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULHUB",
"id": "VHN-78713"
}
],
"trust": 1.45
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
}
]
},
"last_update_date": "2025-04-12T23:36:56.013000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "39187",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39187"
},
{
"title": "Patch for Cisco Edge 300/340 Series Local Privilege Escalation Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/59580"
},
{
"title": "Cisco: Cisco Edge 340 Privilege Escalation Vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=Cisco-SA-20150605-CVE-2015-0767"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39187"
},
{
"trust": 1.4,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0767"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0767"
},
{
"trust": 0.7,
"url": "http://www.securityfocus.com/bid/75027"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/264.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150605-cve-2015-0767"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"db": "BID",
"id": "75027"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"db": "VULHUB",
"id": "VHN-78713"
},
{
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"db": "BID",
"id": "75027"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"date": "2015-06-07T00:00:00",
"db": "VULHUB",
"id": "VHN-78713"
},
{
"date": "2015-06-07T00:00:00",
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"date": "2015-06-05T00:00:00",
"db": "BID",
"id": "75027"
},
{
"date": "2015-06-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"date": "2015-06-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"date": "2015-06-07T18:59:04.577000",
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-06-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-03752"
},
{
"date": "2015-06-08T00:00:00",
"db": "VULHUB",
"id": "VHN-78713"
},
{
"date": "2015-06-08T00:00:00",
"db": "VULMON",
"id": "CVE-2015-0767"
},
{
"date": "2015-06-05T00:00:00",
"db": "BID",
"id": "75027"
},
{
"date": "2015-06-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002958"
},
{
"date": "2015-06-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201506-098"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2015-0767"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "75027"
},
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Edge 340 Device Cisco Edge 300 Vulnerability in software with root privileges",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002958"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201506-098"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…