Lucene search

K
cveCiscoCVE-2012-3063
HistoryJun 20, 2012 - 8:55 p.m.

CVE-2012-3063

2012-06-2020:55:02
CWE-362
cisco
web.nvd.nist.gov
36
cisco
ace
cve-2012-3063
vulnerability
access restrictions
management ip
multicontext mode

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

AI Score

6.2

Confidence

Low

EPSS

0.002

Percentile

55.5%

Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode is enabled, does not properly share a management IP address among multiple contexts, which allows remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances, and read or modify configuration settings, via a login attempt to a context, aka Bug ID CSCts30631, a different vulnerability than CVE-2012-3058.

Affected configurations

Nvd
Node
ciscoapplication_control_engine_softwareRangea4\(2.0\)
OR
ciscoapplication_control_engine_softwareMatcha1\(7\)
OR
ciscoapplication_control_engine_softwareMatcha1\(7a\)
OR
ciscoapplication_control_engine_softwareMatcha1\(7b\)
OR
ciscoapplication_control_engine_softwareMatcha1\(8\)
OR
ciscoapplication_control_engine_softwareMatcha1\(8a\)
OR
ciscoapplication_control_engine_softwareMatcha3\(1.0\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.1\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.2\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.3\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.4\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.5\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.6\)
OR
ciscoapplication_control_engine_softwareMatcha3\(2.7\)
OR
ciscoapplication_control_engine_softwareMatcha4\(1.0\)
OR
ciscoapplication_control_engine_softwareMatcha4\(1.1\)
OR
ciscoapplication_control_engine_softwareMatcha4\(2.1\)
OR
ciscoapplication_control_engine_softwareMatcha4\(2.2\)
OR
ciscoapplication_control_engine_softwareMatcha5\(1.0\)
VendorProductVersionCPE
ciscoapplication_control_engine_software*cpe:2.3:a:cisco:application_control_engine_software:*:*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea1(7)cpe:2.3:a:cisco:application_control_engine_software:a1\(7\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea1(7a)cpe:2.3:a:cisco:application_control_engine_software:a1\(7a\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea1(7b)cpe:2.3:a:cisco:application_control_engine_software:a1\(7b\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea1(8)cpe:2.3:a:cisco:application_control_engine_software:a1\(8\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea1(8a)cpe:2.3:a:cisco:application_control_engine_software:a1\(8a\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea3(1.0)cpe:2.3:a:cisco:application_control_engine_software:a3\(1.0\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea3(2.1)cpe:2.3:a:cisco:application_control_engine_software:a3\(2.1\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea3(2.2)cpe:2.3:a:cisco:application_control_engine_software:a3\(2.2\):*:*:*:*:*:*:*
ciscoapplication_control_engine_softwarea3(2.3)cpe:2.3:a:cisco:application_control_engine_software:a3\(2.3\):*:*:*:*:*:*:*
Rows per page:
1-10 of 191

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

AI Score

6.2

Confidence

Low

EPSS

0.002

Percentile

55.5%