The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1196 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-04-29 14:55
Updated : 2013-04-30 06:26
NVD link : CVE-2013-1196
Mitre link : CVE-2013-1196
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
cisco
- prime_network_control_system
- unified_provisioning_manager
- prime_data_center_network_manager
- prime_collaboration
- identity_services_engine_software
- context_directory_agent
- secure_access_control_system
- quad
- application_networking_manager
- network_services_manager
- prime_lan_management_solution