2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2013-1186" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2013-04-25T10:55:01.770" ,
2024-11-22 19:15:24 +00:00
"lastModified" : "2024-11-21T01:49:04.437" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Cisco Unified Computing System (UCS) 1.x before 1.4(4) and 2.x before 2.0(2m) allows remote attackers to bypass KVM authentication via a crafted authentication request to a Cisco Integrated Management Controller (IMC), aka Bug ID CSCts53746."
} ,
{
"lang" : "es" ,
"value" : "Cisco Unified Computing System (UCS) v1.x antes v1.4(4) y v2.x antes v2.0 (2m), permite a atacantes remotos evitar la autenticaci\u00f3n de KVM a trav\u00e9s de una solicitud de autenticaci\u00f3n dise\u00f1ada a una gesti\u00f3n integrada de Cisco Controller (IMC), tambi\u00e9n conocido como Bug ID CSCts53746 ."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-22 19:15:24 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 19:15:24 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-287"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB67F2CC-67A3-42B0-A241-3BAB8EC52AC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\\(2k\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "097EBEF0-8228-4034-93CC-F50226633D64"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75680C91-A1EF-4BE1-8D26-C4763E44A091"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\\(1m\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "44E4A6EA-FFBE-41C9-9A99-135FB9C1AD3C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "881A281B-F042-4662-973B-ECB9C536A0B8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D4CEC2A3-E00F-4DD9-A9A7-436131554733"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1a\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AC29BA47-A40A-4666-BF60-7949406C56DC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1d\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CB4EB98-5F8D-4BC1-813C-397B7E82E891"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1c\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E8C881B-CAAC-40AB-A9BF-93495BAFE56F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1m\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "20C079CC-34E2-4C8D-ABC9-6D76F4A22D73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1n\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F2FDBA01-AE8E-4B06-9A4E-71CB16D3C592"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1o\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "765CC42E-FAC8-43D6-9B40-B8CF7272C4FA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1p\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C0806ED-7F9C-4166-B47A-0381C215FF2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1q\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76367743-6762-4C70-AFD7-4848E2FE3F61"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1t\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4857DF36-804A-4B2B-B2AA-37E8A0036F65"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1w\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3B18FB5A-F569-413C-BA09-58C28EF9316C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1y\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41EC377E-7DAD-4E6C-AC3F-215B6EAB05D6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1m\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "469AF1BD-4F2B-4830-99DD-A51EB562B559"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3i\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B66B97A2-05E3-49B5-8CD7-9F85155AE911"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3l\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E23273C6-256C-4541-ACB9-54AF6C167694"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3m\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C863FFF-0BF7-40F2-B75C-FAFA7FCAF49A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3q\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AAB9E22-6D0A-4894-83F1-A61412DEEF12"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3s\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9234FFB6-7A06-44F5-8A66-2DCDBB750A85"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3u\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F730CFA8-7D04-47FC-80D0-D9A9A96442BF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3y\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DD8F5ECD-BEB9-450A-8588-C66DB1749191"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B3C126B-3C93-4CB1-8AE5-875866119A43"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1s\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "196AED55-BFF6-4EC3-9161-C06896E4B1C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1t\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6F4760A3-C8BE-4C7E-AC05-0ABEC8B57923"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1w\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66EF9AAC-6C24-43EA-BF46-A6B36F9F830E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1x\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "46A54C70-DDA6-4A9B-A5A5-D9D413BFF44E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "908F8E5E-9BC4-4682-8C25-C07DB032A18B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6584DF3-E466-49BE-B4D8-3E249B7816F7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:cisco:unified_computing_system_integrated_management_controller:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "96F29BD7-06E5-4149-90CB-F9733D04AFF7"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Vendor Advisory"
]
2024-11-22 19:15:24 +00:00
} ,
{
"url" : "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-ucsmulti" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}