Lucene search

K
ciscoCiscoCISCO-SA-20131009-CVE-2013-5506
HistoryOct 09, 2013 - 4:14 p.m.

Cisco Firewall Services Module Command Authorization Vulnerability

2013-10-0916:14:26
tools.cisco.com
8

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

A vulnerability in the authorization code of the Cisco Firewall Services Module (FWSM) could allow an authenticated but unprivileged, local attacker to delete, modify, or view the configuration of any other context of the affected system.

The vulnerability is due to insufficient authorization safeguards of certain administrative commands in a user context when the affected system is configured for multiple context mode. An attacker could exploit this vulnerability by executing certain commands in any of the user contexts of the affected system.

Cisco has confirmed the vulnerability in a security advisory and released software updates.

Only an attacker who could log in locally to the affected device could exploit the vulnerability, decreasing the potential source of attacks.

Affected configurations

Vulners
Node
ciscofirewall_services_moduleMatchany
OR
ciscofirewall_services_moduleMatchany

6.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:S/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for CISCO-SA-20131009-CVE-2013-5506