The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 - Vendor Advisory |
Information
Published : 2013-04-29 21:55
Updated : 2024-11-21 01:49
NVD link : CVE-2013-1196
Mitre link : CVE-2013-1196
CVE.ORG link : CVE-2013-1196
JSON object : View
Products Affected
cisco
- unified_provisioning_manager
- secure_access_control_system
- prime_data_center_network_manager
- prime_collaboration
- context_directory_agent
- application_networking_manager
- identity_services_engine_software
- prime_network_control_system
- prime_lan_management_solution
- quad
- network_services_manager
CWE
CWE-20
Improper Input Validation