Cisco Virtualization Experience Client Privilege Escalation Vulnerability

Cisco-SA-20130710-CVE-2013-3408 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the function handling the operating system permissions of Cisco Virtualization Experience Client 6000 Series could allow an authenticated, local attacker to take full control of the affected system. The vulnerability is due to improper implementation of the permissions for the underlying operating system. An attacker could exploit this vulnerability by logging in to the system and executing a series of commands that could lead to escalated privileges. An exploit could allow the unprivileged attacker to escalate privileges and take full control of the affected system. Cisco has confirmed the vulnerability in a security notice and has released software updates. To exploit this vulnerability, an attacker requires authenticated access to the targeted system and the ability to authenticate to a privileged security context. Authenticated access may require the attacker to access trusted, internal networks. These access requirements could limit the likelihood of a successful exploit.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2013-3408
Cisco Bug IDsCSCuc31764
CVSS ScoreBase 6.8
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C

Products with public affected evidence