First published: Tue Feb 19 2013(Updated: )
The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46058, CSCue46013, CSCue46031, CSCue46035, and CSCue46042.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Application Networking Manager | ||
Cisco Context Directory Agent | ||
Cisco Identity Services Engine Software | ||
Cisco Network Services Manager | ||
Cisco Prime Collaboration | ||
Cisco Prime LAN Management Solution | ||
Cisco Prime Network Control System | ||
Cisco Quad | ||
Cisco Secure Access Control System | ||
Cisco Unified Provisioning Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1125 has a medium severity rating with a score of 6.8.
CVE-2013-1125 affects various Cisco products including Identity Services Engine, Secure Access Control System, and Prime LAN Management Solution.
To fix CVE-2013-1125, update the affected Cisco products to their latest versions provided by Cisco.
CVE-2013-1125 is classified under CWE-20, which pertains to input validation issues.
The risk posed by CVE-2013-1125 depends on whether vulnerable versions of the affected Cisco products are still in use.