The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2013-04-29 21:55
Updated : 2024-02-28 12:00
NVD link : CVE-2013-1196
Mitre link : CVE-2013-1196
CVE.ORG link : CVE-2013-1196
JSON object : View
Products Affected
cisco
- prime_data_center_network_manager
- quad
- identity_services_engine_software
- prime_lan_management_solution
- context_directory_agent
- network_services_manager
- prime_collaboration
- application_networking_manager
- unified_provisioning_manager
- prime_network_control_system
- secure_access_control_system
CWE
CWE-20
Improper Input Validation