Vulnslist

find the latest Cisco vulnerabilities

Cisco Unified Computing System Fabric Interconnect Arbitrary File Access Vulnerability

Cisco-SA-20131001-CVE-2012-4095 · Medium · Published · Updated

A vulnerability in the local file editor of the Cisco Unified Computing System fabric interconnect could allow an authenticated, local attacker to access arbitrary files on the userland filesystem with root privileges. The vulnerability is due to improper input filtering . An attacker could exploit this vulnerability by using specific key bindings in the editor. A successful exploit could allow the attacker to read and modify arbitrary files with root privileges. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker would need to authenticate and have local access to the targeted device, which may reside on trusted, internal networks. These access requirements limit the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to access local systems.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2012-4095
Cisco Bug IDsCSCtn04521
CVSS ScoreBase 5.5
Base 5.5 AV:L/AC:H/Au:S/C:C/I:C/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco Unified Computing System (Managed)

Related Products

Product CVE Evidence