Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-1125


The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46058, CSCue46013, CSCue46031, CSCue46035, and CSCue46042.


Published

2013-02-19T23:55:02.097

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.1

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_networking_manager - Yes
Application cisco context_directory_agent - Yes
Application cisco identity_services_engine_software - Yes
Application cisco network_services_manager - Yes
Application cisco prime_collaboration - Yes
Application cisco prime_lan_management_solution - Yes
Application cisco prime_network_control_system - Yes
Application cisco quad - Yes
Application cisco secure_access_control_system - Yes
Application cisco unified_provisioning_manager - Yes

References