Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-1196


The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.


Published

2013-04-29T21:55:37.203

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:S/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: SINGLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.1

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-20

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco application_networking_manager - Yes
Application cisco context_directory_agent - Yes
Application cisco identity_services_engine_software - Yes
Application cisco network_services_manager - Yes
Application cisco prime_collaboration - Yes
Application cisco prime_data_center_network_manager - Yes
Application cisco prime_lan_management_solution - Yes
Application cisco prime_network_control_system - Yes
Application cisco quad - Yes
Application cisco secure_access_control_system - Yes
Application cisco unified_provisioning_manager - Yes

References