CVE-2013-1196
CVSS V2 Medium 6.8
CVSS V3 None
Description
The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.
Overview
- CVE ID
- CVE-2013-1196
- Assigner
- ykramarz@cisco.com
- Vulnerability Status
- Analyzed
- Published Version
- 2013-04-29T21:55:37
- Last Modified Date
- 2013-04-30T13:26:28
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:cisco:application_networking_manager:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:context_directory_agent:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:identity_services_engine_software:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:network_services_manager:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:prime_collaboration:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:prime_data_center_network_manager:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:prime_lan_management_solution:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:prime_network_control_system:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:quad:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:secure_access_control_system:-:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:unified_provisioning_manager:-:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:L/Au:S/C:C/I:C/A:C
- Access Vector
- LOCAL
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 6.8
- Severity
- MEDIUM
- Exploitability Score
- 3.1
- Impact Score
- 10
References
Reference URL | Reference Tags |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2013-1196 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1196 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 10:45:42 | Added to TrackCVE | |||
2022-12-01 18:26:07 | psirt@cisco.com | ykramarz@cisco.com | CVE Assigner | updated |
2022-12-01 18:26:07 | 2013-04-29T21:55Z | 2013-04-29T21:55:37 | CVE Published Date | updated |
2022-12-01 18:26:07 | 2013-04-30T13:26:28 | CVE Modified Date | updated | |
2022-12-01 18:26:07 | Analyzed | Vulnerability Status | updated |