Lucene search

K
ciscoCiscoCISCO-SA-20130918-CVE-2012-4093
HistorySep 18, 2013 - 1:58 p.m.

Cisco Unified Computing System Smart Call Home Input Validation Vulnerability

2013-09-1813:58:05
tools.cisco.com
11

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:N/I:N/A:C

EPSS

0

Percentile

9.5%

A vulnerability in Cisco Unified Computing System (UCS) Manager could
allow an authenticated, local attacker to trigger a denial of service (DoS) condition.

The
vulnerability is due to improper input validation. An attacker could
exploit this vulnerability by configuring an invalid contact address for
the Smart Call Home functionality. A successful exploit could allow the
attacker to trigger a DoS condition.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker would need to authenticate and have local access to the targeted device. These access requirements may limit the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscounified_computing_systemMatchany
OR
ciscounified_computing_systemMatchany

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:N/I:N/A:C

EPSS

0

Percentile

9.5%

Related for CISCO-SA-20130918-CVE-2012-4093