Executive Summary
Summary | |
---|---|
Title | Management Center for Cisco Security Agent Remote Code Execution Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20110216-csa | First vendor Publication | 2011-01-07 |
Vendor | Cisco | Last vendor Modification | 2011-02-16 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. Cisco has released free software updates that address this vulnerability. A workaround is available to mitigate this vulnerability. |
Original Source
Url : http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6 (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
SAINT Exploits
Description | Link |
---|---|
Cisco Security Agent Management Center Code Execution | More info here |
ExploitDB Exploits
id | Description |
---|---|
2011-04-12 | Cisco Security Agent Management Console |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70884 | Cisco Security Agent Management Center webagent.exe st_upload Request Arbitr... Cisco Security Agent contains a flaw related to the Management Center web interface, webagent.exe failing to properly process certain POST parameters when handling an 'st_upload' request. This may allow a remote attacker to create arbitrary files with a crafted 'st_upload' request, allowing for the execution of arbitrary code through those files. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-02-24 | IAVM : 2011-B-0024 - Cisco Security Agent Remote Code Execution Vulnerability Severity : Category I - VMSKEY : V0026079 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-02-11 | Cisco Security Agent Management Center code execution attempt RuleID : 33025 - Revision : 5 - Type : SERVER-WEBAPP |
2015-02-11 | Cisco Security Agent Management Center code execution attempt RuleID : 33024 - Revision : 5 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-09-18 | Name : The remote host has an endpoint security application installed that is potent... File : cisco_csa_management_center_sa20110216.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 10:22:00 |
|
2013-11-11 12:37:29 |
|