fkie_cve-2013-1185
Vulnerability from fkie_nvd
Published
2013-04-25 10:55
Modified
2024-11-21 01:49
Severity ?
Summary
The web interface in the Manager component in Cisco Unified Computing System (UCS) 1.x and 2.x before 2.0(2m) allows remote attackers to obtain sensitive information by reading a (1) technical-support bundle file or (2) on-device configuration backup, aka Bug ID CSCtq86543.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB67F2CC-67A3-42B0-A241-3BAB8EC52AC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\\(2k\\):*:*:*:*:*:*:*", "matchCriteriaId": "097EBEF0-8228-4034-93CC-F50226633D64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75680C91-A1EF-4BE1-8D26-C4763E44A091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "44E4A6EA-FFBE-41C9-9A99-135FB9C1AD3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "881A281B-F042-4662-973B-ECB9C536A0B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4CEC2A3-E00F-4DD9-A9A7-436131554733", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC29BA47-A40A-4666-BF60-7949406C56DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0CB4EB98-5F8D-4BC1-813C-397B7E82E891", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C881B-CAAC-40AB-A9BF-93495BAFE56F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "20C079CC-34E2-4C8D-ABC9-6D76F4A22D73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1n\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2FDBA01-AE8E-4B06-9A4E-71CB16D3C592", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1o\\):*:*:*:*:*:*:*", "matchCriteriaId": "765CC42E-FAC8-43D6-9B40-B8CF7272C4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1p\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C0806ED-7F9C-4166-B47A-0381C215FF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "76367743-6762-4C70-AFD7-4848E2FE3F61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1t\\):*:*:*:*:*:*:*", "matchCriteriaId": "4857DF36-804A-4B2B-B2AA-37E8A0036F65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1w\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B18FB5A-F569-413C-BA09-58C28EF9316C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1y\\):*:*:*:*:*:*:*", "matchCriteriaId": "41EC377E-7DAD-4E6C-AC3F-215B6EAB05D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "469AF1BD-4F2B-4830-99DD-A51EB562B559", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "B66B97A2-05E3-49B5-8CD7-9F85155AE911", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "E23273C6-256C-4541-ACB9-54AF6C167694", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3m\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C863FFF-0BF7-40F2-B75C-FAFA7FCAF49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3q\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AAB9E22-6D0A-4894-83F1-A61412DEEF12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3s\\):*:*:*:*:*:*:*", "matchCriteriaId": "9234FFB6-7A06-44F5-8A66-2DCDBB750A85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3u\\):*:*:*:*:*:*:*", "matchCriteriaId": "F730CFA8-7D04-47FC-80D0-D9A9A96442BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3y\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8F5ECD-BEB9-450A-8588-C66DB1749191", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F587446E-72F2-476E-8122-417FBBE80803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4g\\):*:*:*:*:*:*:*", "matchCriteriaId": "10359225-8D87-4B50-A431-4CF28A442431", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4i\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B5E4EB6-2C64-4432-BEF7-125E6920F418", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4j\\):*:*:*:*:*:*:*", "matchCriteriaId": "963ABB73-9FBC-411A-9498-4279E0A922EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4k\\):*:*:*:*:*:*:*", "matchCriteriaId": "4ECB9171-BDD8-4FAD-9930-1CE03AD3DACB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B3C126B-3C93-4CB1-8AE5-875866119A43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1s\\):*:*:*:*:*:*:*", "matchCriteriaId": "196AED55-BFF6-4EC3-9161-C06896E4B1C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1t\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F4760A3-C8BE-4C7E-AC05-0ABEC8B57923", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1w\\):*:*:*:*:*:*:*", "matchCriteriaId": "66EF9AAC-6C24-43EA-BF46-A6B36F9F830E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1x\\):*:*:*:*:*:*:*", "matchCriteriaId": "46A54C70-DDA6-4A9B-A5A5-D9D413BFF44E", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_integrated_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "96F29BD7-06E5-4149-90CB-F9733D04AFF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web interface in the Manager component in Cisco Unified Computing System (UCS) 1.x and 2.x before 2.0(2m) allows remote attackers to obtain sensitive information by reading a (1) technical-support bundle file or (2) on-device configuration backup, aka Bug ID CSCtq86543." }, { "lang": "es", "value": "La interfaz web en el componente Manager de Cisco Unified Computing System (UCS) v1.x y v2.x antes v2.0(2m) permite a atacantes remotos obtener informaci\u00f3n sensible mediante la lectura de un (1) archivo de paquete de soporte t\u00e9cnico o (2) el Respaldar la configuraci\u00f3n del equipo, tambi\u00e9n conocido como Bug ID CSCtq86543." } ], "id": "CVE-2013-1185", "lastModified": "2024-11-21T01:49:04.310", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-25T10:55:01.750", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.