Cisco Context Directory Agent Privilege Escalation Vulnerability

Cisco-SA-20140109-CVE-2014-0651 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in the administrative interface of Cisco Context Directory Agent (CDA) could allow an authenticated, remote attacker to perform administrative actions. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by accessing an active session. An exploit could allow the attacker to perform administrative actions. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, an attacker must authenticate to a targeted device. This access requirement reduces the likelihood of a successful exploit.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-0651
Cisco Bug IDsCSCuj45347
CVSS ScoreBase 4.9
Base 4.9 AV:N/AC:M/Au:S/C:P/I:P/A:N/E:F/RL:U/RC:C

Products with public affected evidence