Lucene search

K
cve[email protected]CVE-2013-1192
HistoryOct 03, 2022 - 4:14 p.m.

CVE-2013-1192

2022-10-0316:14:47
CWE-20
web.nvd.nist.gov
24
cve-2013-1192
cisco
device manager
mds 9000
nexus 5000
remote attack
windows
command execution
jar file
bug ids
cscty17417
cscty10802
nvd

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.5%

The JAR files on Cisco Device Manager for Cisco MDS 9000 devices before 5.2.8, and Cisco Device Manager for Cisco Nexus 5000 devices, allow remote attackers to execute arbitrary commands on Windows client machines via a crafted element-manager.jnlp file, aka Bug IDs CSCty17417 and CSCty10802.

Affected configurations

NVD
Node
ciscoadaptive_security_appliance_device_managerRange5.2.5
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.4
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.5
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.6
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.7
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.8
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.9
OR
ciscoadaptive_security_appliance_device_managerMatch5.1.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.1.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.3
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.4
AND
cisconexus_5000Match-
OR
cisconexus_5010Match-
OR
cisconexus_5010p_switchMatch-
OR
cisconexus_5020Match-
OR
cisconexus_5020p_switchMatch-
OR
cisconexus_5548pMatch-
OR
cisconexus_5548upMatch-
OR
cisconexus_5596upMatch-
Node
ciscoadaptive_security_appliance_device_managerRange5.2.5
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.4
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.5
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.6
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.7
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.8
OR
ciscoadaptive_security_appliance_device_managerMatch5.0.9
OR
ciscoadaptive_security_appliance_device_managerMatch5.1.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.1.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.1
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.2
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.3
OR
ciscoadaptive_security_appliance_device_managerMatch5.2.4
AND
ciscomds_9000

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.004 Low

EPSS

Percentile

74.5%