Executive Summary
Summary | |
---|---|
Title | Multiple Vulnerabilities in Cisco Security Agent |
Informations | |||
---|---|---|---|
Name | cisco-sa-20100217-csa | First vendor Publication | 2010-01-05 |
Vendor | Cisco | Last vendor Modification | 2010-02-17 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Management Center for Cisco Security Agents is affected by a directory traversal vulnerability and a SQL injection vulnerability. Successful exploitation of the directory traversal vulnerability may allow an authenticated attacker to view and download arbitrary files from the server hosting the Management Center. Successful exploitation of the SQL injection vulnerability may allow an authenticated attacker to execute SQL statements that can cause instability of the product or changes in the configuration. Additionally, the Cisco Security Agent is affected by a denial of service (DoS) vulnerability. Successful exploitation of the Cisco Security Agent agent DoS vulnerability may cause the affected system to crash. Repeated exploitation could result in a sustained DoS condition. These vulnerabilities are independent of each other. Cisco has released free software updates that address these vulnerabilities. |
Original Source
Url : http://www.cisco.com/warp/public/707/cisco-sa-20100217-csa.shtml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25) |
50 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62445 | Cisco Security Agents Crafted TCP Packet Handling Remote DoS |
62444 | Cisco Security Agents Management Center Unspecified SQL Injection Cisco Security Agents Management Center contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to an unspecified script not properly sanitizing user-supplied input to an unspecified parameter. This may allow an attacker to inject or manipulate SQL queries in the back-end database, allowing for the manipulation or disclosure of arbitrary data. |
62443 | Cisco Security Agents Management Center Unspecified Traversal Arbitrary File ... Cisco Security Agents contains a flaw that allows an authenticated attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the Management Center for Cisco Security Agents. This directory traversal attack would allow the attacker to download arbitrary files from local resources. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-02-25 | IAVM : 2010-B-0016 - Multiple Vulnerabilities in Cisco Security Agent Severity : Category I - VMSKEY : V0022697 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-09-25 | Name : The remote network management device is affected by multiple vulnerabilities. File : cisco_prime_ca_sa-20150916.nasl - Type : ACT_GATHER_INFO |
2013-09-18 | Name : The remote host has an endpoint security application installed that is potent... File : cisco_csa_management_center_sa20100217.nasl - Type : ACT_GATHER_INFO |
2013-09-18 | Name : The remote host has an endpoint security application installed that is potent... File : cisco_csa_sa20100217_linux_local.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-09-26 13:24:10 |
|
2014-02-17 10:21:58 |
|
2013-11-11 12:37:29 |
|