CVE-2017-6516
MEDIUMMagniComp SysInfo mcsiwrapper Privilege Escalation
Title source: metasploitDescription
A Local Privilege Escalation Vulnerability in MagniComp's Sysinfo before 10-H64 for Linux and UNIX platforms could allow a local attacker to gain elevated privileges. Parts of SysInfo require setuid-to-root access in order to access restricted system files and make restricted kernel calls. This access could be exploited by a local attacker to gain a root shell prompt using the right combination of environment variables and command line arguments.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by Daniel Lawson, Romain Trouve, bcoles · rubypocsolaris
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/local/magnicomp_sysinfo_mcsiwrapper_priv_esc.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalmultiple
https://www.exploit-db.com/exploits/44150
References (5)
Scores
CVSS v3
6.7
EPSS
0.2136
EPSS Percentile
95.6%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-20
Status
draft
Affected Products (1)
magnicomp/sysinfo
< 10-h62
Timeline
Published
Mar 14, 2017
Tracked Since
Feb 18, 2026