This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2013-01-17
Product Prime Lan Management Solution Last view 2017-09-07
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:prime_lan_management_solution:-:*:*:*:*:*:*:* 5
cpe:2.3:a:cisco:prime_lan_management_solution:4.2.2:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:prime_lan_management_solution:4.2.1:*:*:*:*:*:*:* 2
cpe:2.3:a:cisco:prime_lan_management_solution:4.1:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2_base:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2.3:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2.5:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2.4:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.1_base:*:*:*:*:*:*:* 1
cpe:2.3:a:cisco:prime_lan_management_solution:4.2(5):*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
6.5 2017-09-07 CVE-2017-12225

A vulnerability in the web functionality of the Cisco Prime LAN Management Solution could allow an authenticated, remote attacker to hijack another user's administrative session, aka a Session Fixation Vulnerability. The vulnerability is due to the reuse of a preauthentication session token as part of the postauthentication session. An attacker could exploit this vulnerability by obtaining the presession token ID. An exploit could allow an attacker to hijack an existing user's session. Known Affected Releases 4.2(5). Cisco Bug IDs: CSCvf58392.

7.1 2016-03-11 CVE-2016-1360

Cisco Prime LAN Management Solution (LMS) through 4.2.5 uses the same database decryption key across different customers' installations, which allows local users to obtain cleartext data by leveraging console connectivity, aka Bug ID CSCuw85390.

4.3 2015-02-26 CVE-2015-0594

Multiple cross-site scripting (XSS) vulnerabilities in the help pages in Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS) and Cisco Security Manager, allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug IDs CSCuq54654 and CSCun18263.

4.3 2013-09-13 CVE-2013-5482

Cisco Prime LAN Management Solution (LMS) does not properly restrict use of IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks and unspecified other attacks via a crafted web site, related to a "cross-frame scripting (XFS)" issue, aka Bug ID CSCug77823.

5 2013-09-12 CVE-2013-5488

Cisco Common Services, as used in Cisco Prime LAN Management Solution (LMS), Cisco Security Manager, Cisco Unified Service Monitor, and Cisco Unified Operations Manager, does not properly interact with the ActiveMQ component, which allows remote attackers to cause a denial of service (memory consumption) via simultaneous TCP sessions, aka Bug IDs CSCuh54766, CSCuh01267, CSCuh95976, and CSCuh95969.

6.8 2013-04-29 CVE-2013-1196

The command-line interface in Cisco Secure Access Control System (ACS), Identity Services Engine Software, Context Directory Agent, Application Networking Manager (ANM), Prime Network Control System, Prime LAN Management Solution (LMS), Prime Collaboration, Unified Provisioning Manager, Network Services Manager, Prime Data Center Network Manager (DCNM), and Quad does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCug29384, CSCug13866, CSCug29400, CSCug29406, CSCug29411, CSCug29413, CSCug29416, CSCug29418, CSCug29422, CSCug29425, and CSCug29426, a different issue than CVE-2013-1125.

6.8 2013-02-19 CVE-2013-1125

The command-line interface in Cisco Identity Services Engine Software, Secure Access Control System (ACS), Application Networking Manager (ANM), Prime LAN Management Solution (LMS), Prime Network Control System, Quad, Context Directory Agent, Prime Collaboration, Unified Provisioning Manager, and Network Services Manager does not properly validate input, which allows local users to obtain root privileges via unspecified vectors, aka Bug IDs CSCue46001, CSCud95790, CSCue46021, CSCue46025, CSCue46023, CSCue46058, CSCue46013, CSCue46031, CSCue46035, and CSCue46042.

10 2013-01-17 CVE-2012-6392

Cisco Prime LAN Management Solution (LMS) 4.1 through 4.2.2 on Linux does not properly validate authentication and authorization requests in TCP sessions, which allows remote attackers to execute arbitrary commands via a crafted session, aka Bug ID CSCuc79779.

CWE : Common Weakness Enumeration

%idName
50% (4) CWE-20 Improper Input Validation
12% (1) CWE-384 Session Fixation
12% (1) CWE-264 Permissions, Privileges, and Access Controls
12% (1) CWE-200 Information Exposure
12% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')

Information Assurance Vulnerability Management (IAVM)

id Description
2013-A-0019 Cisco Prime LAN Management Solution Command Execution Vulnerability
Severity: Category I - VMSKEY: V0036577

Snort® IPS/IDS

Date Description
2014-01-10 rsh root
RuleID : 610-community - Type : PROTOCOL-SERVICES - Revision : 16
2014-01-10 rsh root
RuleID : 610 - Type : PROTOCOL-SERVICES - Revision : 16
2014-01-10 Cisco Prime Lan Management rsh command execution attempt
RuleID : 25535 - Type : PROTOCOL-SERVICES - Revision : 8

Nessus® Vulnerability Scanner

id Description
2017-09-11 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170906-prime-lms.nasl - Type: ACT_GATHER_INFO
2013-10-01 Name: The remote host has a network management application installed that is potent...
File: cisco_prime_lms_CSCug77823.nasl - Type: ACT_GATHER_INFO
2000-04-23 Name: It was possible to log on this machine without password.
File: rsh_users.nasl - Type: ACT_ATTACK