CVE-2012-3063 Details

CVE-2012-3063

Published: 2012-06-20
Last Modified: 2013-03-22
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode is enabled, does not properly share a management IP address among multiple contexts, which allows remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances, and read or modify configuration settings, via a login attempt to a context, aka Bug ID CSCts30631, a different vulnerability than CVE-2012-3058.

Analysis
Common Vulnerability Score System v2.0
Severity High
Base Score 7.1/10
Exploit Score 3.9/10
Access Vector Network
Access Complexity High
Authentication Single
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:N/AC:H/Au:S/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:cisco:application_control_engine_software:a1\(7\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a1\(7a\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a1\(7b\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a1\(8\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a1\(8a\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(1.0\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.2\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.3\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.4\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.5\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.6\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.7\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a4\(1.0\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a4\(1.1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:*:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a4\(2.1\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a4\(2.2\):*:*:*:*:*:*:* Yes - -
cpe:2.3:a:cisco:application_control_engine_software:a5\(1.0\):*:*:*:*:*:*:* Yes - -
References

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ace
http://www.securitytracker.com/id?1027188

CVE ID
CVE-2012-3063
Published
2012-06-20
Modified
2013-03-22
CVSSv2.0
High
PCI Compliance
Fail
US-CERT Alert
No
CWE
CWE-362

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.