ID

VAR-201304-0275


CVE

CVE-2013-1170


TITLE

Cisco Prime Network Control System Vulnerability to change database settings on appliance

Trust: 0.8

sources: JVNDB: JVNDB-2013-002225

DESCRIPTION

The Cisco Prime Network Control System (NCS) appliance with software before 1.1.1.24 has a default password for the database user account, which makes it easier for remote attackers to change the configuration or cause a denial of service (service disruption) via unspecified vectors, aka Bug ID CSCtz30468. ( Service interruption ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCtz30468 It is released as.The setting is changed by a third party or service operation is interrupted ( Service interruption ) There is a possibility of being put into a state. Cisco Prime Network Control Systems is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCtz30468. The platform can be used to monitor and troubleshoot wired and wireless LANs. A remote attacker could exploit this vulnerability through an unknown vector to modify the configuration or cause a denial of service (blocked service)

Trust: 1.98

sources: NVD: CVE-2013-1170 // JVNDB: JVNDB-2013-002225 // BID: 59013 // VULHUB: VHN-61172

AFFECTED PRODUCTS

vendor:ciscomodel:prime network control system softwarescope:eqversion:1.1

Trust: 1.6

vendor:ciscomodel:prime network control systemscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:prime network control system softwarescope:ltversion:1.1.1.24

Trust: 0.8

sources: JVNDB: JVNDB-2013-002225 // CNNVD: CNNVD-201304-189 // NVD: CVE-2013-1170

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1170
value: HIGH

Trust: 1.0

NVD: CVE-2013-1170
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201304-189
value: HIGH

Trust: 0.6

VULHUB: VHN-61172
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1170
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61172
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61172 // JVNDB: JVNDB-2013-002225 // CNNVD: CNNVD-201304-189 // NVD: CVE-2013-1170

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-61172 // JVNDB: JVNDB-2013-002225 // NVD: CVE-2013-1170

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-189

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201304-189

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002225

PATCH

title:cisco-sa-20130410-ncsurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130410-ncs

Trust: 0.8

title:28885url:http://tools.cisco.com/security/center/viewAlert.x?alertId=28885

Trust: 0.8

title:cisco-sa-20130410-ncsurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117744_cisco-sa-20130410-ncs-j.html

Trust: 0.8

sources: JVNDB: JVNDB-2013-002225

EXTERNAL IDS

db:NVDid:CVE-2013-1170

Trust: 2.8

db:JVNDBid:JVNDB-2013-002225

Trust: 0.8

db:CNNVDid:CNNVD-201304-189

Trust: 0.7

db:SECUNIAid:53010

Trust: 0.6

db:CISCOid:20130410 CISCO PRIME NETWORK CONTROL SYSTEMS DATABASE DEFAULT CREDENTIALS VULNERABILITY

Trust: 0.6

db:BIDid:59013

Trust: 0.4

db:VULHUBid:VHN-61172

Trust: 0.1

sources: VULHUB: VHN-61172 // BID: 59013 // JVNDB: JVNDB-2013-002225 // CNNVD: CNNVD-201304-189 // NVD: CVE-2013-1170

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130410-ncs

Trust: 2.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1170

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1170

Trust: 0.8

url:http://secunia.com/advisories/53010

Trust: 0.6

url:http://www.cisco.com

Trust: 0.3

sources: VULHUB: VHN-61172 // BID: 59013 // JVNDB: JVNDB-2013-002225 // CNNVD: CNNVD-201304-189 // NVD: CVE-2013-1170

CREDITS

Erik Parker of Amazon

Trust: 0.3

sources: BID: 59013

SOURCES

db:VULHUBid:VHN-61172
db:BIDid:59013
db:JVNDBid:JVNDB-2013-002225
db:CNNVDid:CNNVD-201304-189
db:NVDid:CVE-2013-1170

LAST UPDATE DATE

2024-11-23T22:18:45.704000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61172date:2013-04-29T00:00:00
db:BIDid:59013date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002225date:2013-04-15T00:00:00
db:CNNVDid:CNNVD-201304-189date:2013-04-16T00:00:00
db:NVDid:CVE-2013-1170date:2024-11-21T01:49:02.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-61172date:2013-04-11T00:00:00
db:BIDid:59013date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002225date:2013-04-15T00:00:00
db:CNNVDid:CNNVD-201304-189date:2013-04-12T00:00:00
db:NVDid:CVE-2013-1170date:2013-04-11T10:55:02.070