var-201304-0275
Vulnerability from variot
The Cisco Prime Network Control System (NCS) appliance with software before 1.1.1.24 has a default password for the database user account, which makes it easier for remote attackers to change the configuration or cause a denial of service (service disruption) via unspecified vectors, aka Bug ID CSCtz30468. ( Service interruption ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCtz30468 It is released as.The setting is changed by a third party or service operation is interrupted ( Service interruption ) There is a possibility of being put into a state. Cisco Prime Network Control Systems is prone to a security-bypass vulnerability. Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCtz30468. The platform can be used to monitor and troubleshoot wired and wireless LANs. A remote attacker could exploit this vulnerability through an unknown vector to modify the configuration or cause a denial of service (blocked service)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0275", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "prime network control system software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.1" }, { "model": "prime network control system", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "prime network control system software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "1.1.1.24" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:prime_network_control_system_software:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:prime_network_control_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-1170" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Erik Parker of Amazon", "sources": [ { "db": "BID", "id": "59013" } ], "trust": 0.3 }, "cve": "CVE-2013-1170", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2013-1170", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-61172", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-1170", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201304-189", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-61172", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-61172" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Cisco Prime Network Control System (NCS) appliance with software before 1.1.1.24 has a default password for the database user account, which makes it easier for remote attackers to change the configuration or cause a denial of service (service disruption) via unspecified vectors, aka Bug ID CSCtz30468. ( Service interruption ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCtz30468 It is released as.The setting is changed by a third party or service operation is interrupted ( Service interruption ) There is a possibility of being put into a state. Cisco Prime Network Control Systems is prone to a security-bypass vulnerability. \nAttackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks. \nThis issue is tracked by Cisco Bug ID CSCtz30468. The platform can be used to monitor and troubleshoot wired and wireless LANs. A remote attacker could exploit this vulnerability through an unknown vector to modify the configuration or cause a denial of service (blocked service)", "sources": [ { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "BID", "id": "59013" }, { "db": "VULHUB", "id": "VHN-61172" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1170", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-002225", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-189", "trust": 0.7 }, { "db": "SECUNIA", "id": "53010", "trust": 0.6 }, { "db": "CISCO", "id": "20130410 CISCO PRIME NETWORK CONTROL SYSTEMS DATABASE DEFAULT CREDENTIALS VULNERABILITY", "trust": 0.6 }, { "db": "BID", "id": "59013", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-61172", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61172" }, { "db": "BID", "id": "59013" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "id": "VAR-201304-0275", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-61172" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:38:34.542000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130410-ncs", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130410-ncs" }, { "title": "28885", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=28885" }, { "title": "cisco-sa-20130410-ncs", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1117/1117744_cisco-sa-20130410-ncs-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61172" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130410-ncs" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1170" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1170" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53010" }, { "trust": 0.3, "url": "http://www.cisco.com" } ], "sources": [ { "db": "VULHUB", "id": "VHN-61172" }, { "db": "BID", "id": "59013" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-61172" }, { "db": "BID", "id": "59013" }, { "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "db": "NVD", "id": "CVE-2013-1170" }, { "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-11T00:00:00", "db": "VULHUB", "id": "VHN-61172" }, { "date": "2013-04-10T00:00:00", "db": "BID", "id": "59013" }, { "date": "2013-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "date": "2013-04-11T10:55:02.070000", "db": "NVD", "id": "CVE-2013-1170" }, { "date": "2013-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-29T00:00:00", "db": "VULHUB", "id": "VHN-61172" }, { "date": "2013-04-10T00:00:00", "db": "BID", "id": "59013" }, { "date": "2013-04-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002225" }, { "date": "2013-04-29T04:00:00", "db": "NVD", "id": "CVE-2013-1170" }, { "date": "2013-04-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-189" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-189" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Prime Network Control System Vulnerability to change database settings on appliance", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002225" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-189" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.