var-201310-0533
Vulnerability from variot
The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context's configuration via unspecified commands, aka Bug ID CSCue46080. A local attacker may exploit this issue to execute certain commands in any of the user contexts of the affected system. This issue is being tracked by Cisco Bug ID CSCue46080
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0533", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(4\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(3\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(2\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(7\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(1\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(3\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(5\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(6\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.0\\(8\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(14\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(22\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(11\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(12\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(18\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(12\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(14\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(10\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(4\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(12\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(6\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(4\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(10\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(18\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(2\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(4\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(6\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(15\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(9\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(17\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(3\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(5\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(15\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(5\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(7\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(7\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(19\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(12\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(21\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(11\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(9\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(1\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(5\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(2\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(9\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(6\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(16\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(11\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(14\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(8\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(20\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(11\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(17\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(19\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(13\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(16\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(3\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(7\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(13\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(10\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(13\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(10\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(20\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(2\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(8\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(15\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.2\\(21\\)" }, { "model": "firewall services module software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.1\\(8\\)" }, { "model": "firewall services module software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "3.2(27)" }, { "model": "firewall services module software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.1(14)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(20)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(23)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(22)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(6)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(16)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.2)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(2)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(10.1)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.1)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(13)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1.2)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(6)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(8)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(17.2)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(11.1)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(8)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(20)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(21)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(1.9)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(5)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(16.1)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(4)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.24)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(16)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(7)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0(15)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.18)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.3)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(17.2)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(3)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1.1)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(1.7)" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1" }, { "model": "firewall services module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.1(3.11)" } ], "sources": [ { "db": "BID", "id": "62918" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(15\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(13\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(18\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(14\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(16\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(20\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(22\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(12\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(13\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(14\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(21\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(17\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(18\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(19\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(14\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(15\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(16\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(17\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(12\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(7\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(12\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:4.1\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(12\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(19\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(20\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(6\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.1\\(8\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(13\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(15\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(21\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:firewall_services_module_software:3.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5506" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "62918" } ], "trust": 0.3 }, "cve": "CVE-2013-5506", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 2.7, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.6, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2013-5506", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 2.7, "id": "VHN-65508", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5506", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201310-234", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65508", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65508" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The authorization functionality in Cisco Firewall Services Module (FWSM) 3.1.x and 3.2.x before 3.2(25) and 4.x before 4.1(13), when multiple-context mode is enabled, allows local users to read or modify any context\u0027s configuration via unspecified commands, aka Bug ID CSCue46080. \nA local attacker may exploit this issue to execute certain commands in any of the user contexts of the affected system. \nThis issue is being tracked by Cisco Bug ID CSCue46080", "sources": [ { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "BID", "id": "62918" }, { "db": "VULHUB", "id": "VHN-65508" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5506", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2013-004641", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-234", "trust": 0.7 }, { "db": "CISCO", "id": "20131009 MULTIPLE VULNERABILITIES IN CISCO FIREWALL SERVICES MODULE SOFTWARE", "trust": 0.6 }, { "db": "BID", "id": "62918", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65508" }, { "db": "BID", "id": "62918" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "id": "VAR-201310-0533", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65508" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:09:00.826000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20131009-fwsm", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-fwsm" }, { "title": "31097", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31097" }, { "title": "cisco-sa-20131009-fwsm", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1119/1119988_cisco-sa-20131009-fwsm-j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004641" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65508" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-fwsm" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5506" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5506" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65508" }, { "db": "BID", "id": "62918" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65508" }, { "db": "BID", "id": "62918" }, { "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "db": "NVD", "id": "CVE-2013-5506" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-13T00:00:00", "db": "VULHUB", "id": "VHN-65508" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62918" }, { "date": "2013-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "date": "2013-10-13T10:20:04.223000", "db": "NVD", "id": "CVE-2013-5506" }, { "date": "2013-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-15T00:00:00", "db": "VULHUB", "id": "VHN-65508" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62918" }, { "date": "2013-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004641" }, { "date": "2013-10-15T17:47:47.273000", "db": "NVD", "id": "CVE-2013-5506" }, { "date": "2013-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "62918" }, { "db": "CNNVD", "id": "CNNVD-201310-234" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Firewall Services Module Vulnerability in reading context settings in authentication function", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004641" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-234" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.