Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C1970EA0-E541-4594-84A9-39A4242FAB42", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "29718258-B19E-44F4-B7CA-534371926004", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF022130-6341-4F33-9793-FF90B86F3C6E", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "07544450-7C3E-40A9-A619-1544120FB6B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C8E19BA-5E10-4E3D-A63C-BB5643F3BBDA", "vulnerable": true}, {"criteria": "cpe:2.3:a:cisco:cloud_services_platform_2100:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "4170C700-6EE6-49B9-B994-4523EE6583E7", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "A vulnerability in the web console of the Cisco Cloud Services Platform (CSP) 2100 could allow an authenticated, remote attacker to interact maliciously with the services or virtual machines (VMs) operating remotely on an affected CSP device. The vulnerability is due to weaknesses in the generation of certain authentication mechanisms in the URL of the web console. An attacker could exploit this vulnerability by browsing to one of the hosted VMs' URLs in Cisco CSP and viewing specific patterns that control the web application's mechanisms for authentication control. An exploit could allow the attacker to access a specific VM on the CSP, which causes a complete loss of the system's confidentiality, integrity, and availability. This vulnerability affects Cisco Cloud Services Platform (CSP) 2100 running software release 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1, or 2.2.2. Cisco Bug IDs: CSCve64690."}, {"lang": "es", "value": "Una vulnerabilidad en la consola web de Cisco Cloud Services Platform (CSP) 2100 podr\u00eda permitir que un atacante remoto autenticado interact\u00fae con fines maliciosos con los servicios o m\u00e1quinas virtuales que operan remotamente en un dispositivo CSP afectado. La vulnerabilidad se debe a una debilidad en la generaci\u00f3n de ciertos mecanismos de autenticaci\u00f3n en la URL de la consola web. Un atacante podr\u00eda explotar esta vulnerabilidad navegando por una de las URL de las m\u00e1quinas virtuales alojadas en Cisco CSP y visualizando patrones espec\u00edficos que controlan los mecanismos de la aplicaci\u00f3n web para el control de autenticaci\u00f3n. Un exploit podr\u00eda permitir que el atacante acceda a una m\u00e1quina virtual espec\u00edfica en el CSP, lo que provoca una p\u00e9rdida completa de la confidencialidad, integridad y disponibilidad del sistema. Esta vulnerabilidad afecta a Cisco Cloud Services Platform (CSP) 2100 cuando ejecuta las distribuciones de software 2.1.0, 2.1.1, 2.1.2, 2.2.0, 2.2.1 o 2.2.2. Cisco Bug IDs: CSCve64690."}], "id": "CVE-2017-12251", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.1, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-10-19T08:29:00.217", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101487"}, {"source": "psirt@cisco.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039613"}, {"source": "psirt@cisco.com", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ccs"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/101487"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1039613"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-ccs"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "psirt@cisco.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}