SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Application Control Engine Vendors:   Cisco
Cisco Application Control Engine Input Validation Flaw Lets Remote Authenticated Users Execute Arbitrary CLI Commands on the Target System
SecurityTracker Alert ID:  1035104
SecurityTracker URL:  http://securitytracker.com/id/1035104
CVE Reference:   CVE-2016-1297   (Links to External Site)
Date:  Feb 25 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): ACE 4710; A5 up to A5(3.0)
Description:   A vulnerability was reported in Cisco Application Control Engine. A remote authenticated user can execute arbitrary commands on the target system.

A remote authenticated user can send a specially crafted HTTP POST request to the target Device Manager graphical user interface to bypass role-based access control (RBAC) restrictions and execute arbitrary command line interface commands on the target system. The commands will run with 'admin' user privileges.

The vendor has assigned bug ID CSCul84801 to this vulnerability.

Jan Kadijk of Warpnet BV repored this vulnerability.

Impact:   A remote authenticated user can execute arbitrary commands on the target system with 'admin' privileges.
Solution:   The vendor has issued a fix.

The vendor's advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC