First published: Thu Jan 17 2013(Updated: )
Cisco Prime LAN Management Solution (LMS) 4.1 through 4.2.2 on Linux does not properly validate authentication and authorization requests in TCP sessions, which allows remote attackers to execute arbitrary commands via a crafted session, aka Bug ID CSCuc79779.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime LAN Management Solution | =4.1 | |
Cisco Prime LAN Management Solution | =4.2 | |
Cisco Prime LAN Management Solution | =4.2.1 | |
Cisco Prime LAN Management Solution | =4.2.2 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6392 has been classified with a high severity level due to its potential to allow remote command execution.
CVE-2012-6392 affects Cisco Prime LAN Management Solution versions 4.1 to 4.2.2 by failing to properly validate authentication and authorization requests.
To fix CVE-2012-6392, upgrade Cisco Prime LAN Management Solution to a patched version provided by Cisco.
CVE-2012-6392 impacts Cisco Prime LAN Management Solution versions 4.1 through 4.2.2.
Yes, CVE-2012-6392 can lead to unauthorized access as it allows remote attackers to execute arbitrary commands.