First published: Sat Jun 04 2016(Updated: )
Cisco Prime Network Analysis Module (NAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) and Prime Virtual Network Analysis Module (vNAM) before 6.1(1) patch.6.1-2-final and 6.2.x before 6.2(1) allow local users to obtain root access via crafted CLI input, aka Bug ID CSCuy21892.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Virtual Network Analysis Module Software | =5.0.0 | |
Cisco Prime Virtual Network Analysis Module Software | =5.0.1 | |
Cisco Prime Virtual Network Analysis Module Software | =5.0.2 | |
Cisco Prime Virtual Network Analysis Module Software | =5.1.0 | |
Cisco Prime Virtual Network Analysis Module Software | =5.1.2 | |
Cisco Prime Virtual Network Analysis Module Software | =6.0.2 | |
Cisco Prime Virtual Network Analysis Module Software | =6.1.0 | |
Cisco Prime Virtual Network Analysis Module Software | =6.1.1 | |
Cisco Prime Virtual Network Analysis Module Software | =6.2.0 | |
Cisco Prime Virtual Network Analysis Module Software | =6.0.0 | |
Cisco Prime Virtual Network Analysis Module Software | =6.1.0 | |
Cisco Prime Virtual Network Analysis Module Software | =6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1390 is classified as having a high severity due to the potential for local users to gain root access.
To fix CVE-2016-1390, update to the appropriate patched version of Cisco Prime Network Analysis Module or Prime Virtual Network Analysis Module as specified by the vendor.
CVE-2016-1390 affects Cisco Prime Network Analysis Module versions from 5.0.0 up to but not including 6.1(1) patch.6.1-2-final and also versions of Prime Virtual Network Analysis Module prior to 6.1(1) patch.6.1-2-final.
CVE-2016-1390 exploits a vulnerability that allows local users to obtain root access through crafted command-line interface (CLI) input.
Yes, CVE-2016-1390 poses a significant risk to network security as it can allow unauthorized access and control over the affected systems.