ID

VAR-201711-0314


CVE

CVE-2017-12313


TITLE

Cisco Network Academy Packet Tracer Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-010477

DESCRIPTION

An untrusted search path (aka DLL Preload) vulnerability in the Cisco Network Academy Packet Tracer software could allow an authenticated, local attacker to execute arbitrary code via DLL hijacking if a local user with administrative privileges executes the installer in the current working directory where a crafted DLL has been placed by an attacker. The vulnerability is due to incomplete input validation of path and file names of a DLL file before it is loaded. An attacker could exploit this vulnerability by creating a malicious DLL file and installing it in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to the SYSTEM account. An attacker would need valid user credentials to exploit this vulnerability. Cisco Network Academy Packet Tracer The software contains input validation vulnerabilities and unreliable search path vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Network Academy Packet Tracer is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to execute arbitrary code with administrative privileges. The software is capable of simulating file commands, visualization and configuration of network devices, and simulating data transfer interactions, etc

Trust: 1.98

sources: NVD: CVE-2017-12313 // JVNDB: JVNDB-2017-010477 // BID: 101858 // VULHUB: VHN-102823

AFFECTED PRODUCTS

vendor:ciscomodel:packet tracerscope: - version: -

Trust: 1.4

vendor:ciscomodel:packet tracerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:network academy packet tracerscope:eqversion:0

Trust: 0.3

sources: BID: 101858 // JVNDB: JVNDB-2017-010477 // CNNVD: CNNVD-201711-669 // NVD: CVE-2017-12313

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12313
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-12313
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201711-669
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102823
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12313
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-102823
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12313
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102823 // JVNDB: JVNDB-2017-010477 // CNNVD: CNNVD-201711-669 // NVD: CVE-2017-12313

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:CWE-426

Trust: 1.9

problemtype:CWE-427

Trust: 1.0

sources: VULHUB: VHN-102823 // JVNDB: JVNDB-2017-010477 // NVD: CVE-2017-12313

THREAT TYPE

local

Trust: 0.9

sources: BID: 101858 // CNNVD: CNNVD-201711-669

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201711-669

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010477

PATCH

title:cisco-sa-20171115-cpturl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-cpt

Trust: 0.8

sources: JVNDB: JVNDB-2017-010477

EXTERNAL IDS

db:NVDid:CVE-2017-12313

Trust: 2.8

db:BIDid:101858

Trust: 2.0

db:JVNDBid:JVNDB-2017-010477

Trust: 0.8

db:CNNVDid:CNNVD-201711-669

Trust: 0.7

db:VULHUBid:VHN-102823

Trust: 0.1

sources: VULHUB: VHN-102823 // BID: 101858 // JVNDB: JVNDB-2017-010477 // CNNVD: CNNVD-201711-669 // NVD: CVE-2017-12313

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171115-cpt

Trust: 2.0

url:http://www.securityfocus.com/bid/101858

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12313

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12313

Trust: 0.8

url:http://www.vmware.com

Trust: 0.3

sources: VULHUB: VHN-102823 // BID: 101858 // JVNDB: JVNDB-2017-010477 // CNNVD: CNNVD-201711-669 // NVD: CVE-2017-12313

CREDITS

Kushal Arvind Shah of Fortinet's FortiGuard Labs.

Trust: 0.3

sources: BID: 101858

SOURCES

db:VULHUBid:VHN-102823
db:BIDid:101858
db:JVNDBid:JVNDB-2017-010477
db:CNNVDid:CNNVD-201711-669
db:NVDid:CVE-2017-12313

LAST UPDATE DATE

2025-04-20T23:27:14.905000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102823date:2019-10-09T00:00:00
db:BIDid:101858date:2017-12-19T22:37:00
db:JVNDBid:JVNDB-2017-010477date:2017-12-15T00:00:00
db:CNNVDid:CNNVD-201711-669date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12313date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-102823date:2017-11-16T00:00:00
db:BIDid:101858date:2017-11-15T00:00:00
db:JVNDBid:JVNDB-2017-010477date:2017-12-15T00:00:00
db:CNNVDid:CNNVD-201711-669date:2017-11-20T00:00:00
db:NVDid:CVE-2017-12313date:2017-11-16T07:29:00.663