First published: Thu Jun 27 2013(Updated: )
The web framework in IronPort AsyncOS on Cisco Web Security Appliance devices before 7.1.3-013, 7.5 before 7.5.0-838, and 7.7 before 7.7.0-550; Email Security Appliance devices before 7.1.5-104, 7.3 before 7.3.2-026, 7.5 before 7.5.2-203, and 7.6 before 7.6.3-019; and Content Security Management Appliance devices before 7.2.2-110, 7.7 before 7.7.0-213, and 7.8 and 7.9 before 7.9.1-102 allows remote authenticated users to execute arbitrary commands via crafted command-line input in a URL, aka Bug IDs CSCzv85726, CSCzv44633, and CSCzv24579.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco AsyncOS | <=7.1.3 | |
Cisco AsyncOS | =7.2 | |
Cisco AsyncOS | =7.3 | |
Cisco AsyncOS | =7.5 | |
Cisco AsyncOS | =7.6 | |
Cisco AsyncOS | =7.7 | |
Cisco AsyncOS | =7.8 | |
Cisco AsyncOS | =7.9 | |
Cisco Content Security Management | ||
Cisco Web Security Appliance | ||
Cisco Email Security Appliance |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3384 is considered a moderate severity vulnerability that can potentially lead to unauthorized access.
To remediate CVE-2013-3384, you should update your Cisco Web Security Appliance or Email Security Appliance to the latest version available.
CVE-2013-3384 affects several versions of Cisco IronPort AsyncOS, Cisco Web Security Appliance, and Cisco Email Security Appliance.
The impact of CVE-2013-3384 includes potential exposure to unauthorized remote access and execution of arbitrary commands.
There are no specific workarounds for CVE-2013-3384; updating to a patched version is the recommended solution.