First published: Mon Sep 23 2013(Updated: )
DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) before 6.2(1) allows remote attackers to read arbitrary files via unspecified vectors, aka Bug ID CSCue77029.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Data Center Network Manager (DCNM) | <=6.1\(1b\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.2\(2e\) | |
Cisco Prime Data Center Network Manager (DCNM) | =6.1\(1a\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.1\(2\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.1\(3\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.1\(4\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.1\(5\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.2\(1\) | |
Cisco Prime Data Center Network Manager (DCNM) | =4.2\(3\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.0\(2\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.0\(3\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.1\(1\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.1\(2\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.1\(3u\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.2\(2\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.2\(2a\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.2\(2b\) | |
Cisco Prime Data Center Network Manager (DCNM) | =5.2\(2c\) | |
Cisco Prime Data Center Network Manager (DCNM) | =6.1\(1b\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5487 has a severity rating of medium, allowing remote attackers to read arbitrary files.
To fix CVE-2013-5487, upgrade to Cisco Prime Data Center Network Manager version 6.2(1) or later.
CVE-2013-5487 affects Cisco Prime Data Center Network Manager versions prior to 6.2(1), including 4.1(2), 4.1(3), 4.1(4), 4.1(5), 4.2(1), 4.2(3), 5.0(2), 5.1(1), 5.1(2), 5.1(3u), 5.2(2), 5.2(2a), 5.2(2b), and 5.2(2c).
CVE-2013-5487 exposes the risk of remote file reading, which can lead to unauthorized exposure of sensitive information.
No specific workaround is provided for CVE-2013-5487; upgrading to the patched version is the recommended solution.