ID

VAR-201602-0043


CVE

CVE-2016-1297


TITLE

Cisco Application Control Engine of Device Manager GUI In RBAC Vulnerabilities that can be bypassed

Trust: 0.8

sources: JVNDB: JVNDB-2016-001784

DESCRIPTION

The Device Manager GUI in Cisco Application Control Engine (ACE) 4710 A5 before A5(3.1) allows remote authenticated users to bypass intended RBAC restrictions and execute arbitrary CLI commands with admin privileges via an unspecified parameter in a POST request, aka Bug ID CSCul84801. The CiscoACE4710ApplicationControlEngine is a set of load balancing and application delivery solutions from Cisco, Inc., a family of ACE application switches designed to increase the security and stability of data center applications. A command injection vulnerability exists in the CiscoACE4710ApplicationControlEngine using A5 (3.0) and previous versions of the A5 software. A remote attacker could exploit the vulnerability to bypass the role-based access control (RBAC) restriction by sending an HTTP POST request with a CLI command. The vulnerability is due to insufficient validation of user-supplied input. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace

Trust: 2.34

sources: NVD: CVE-2016-1297 // JVNDB: JVNDB-2016-001784 // CNVD: CNVD-2016-01337 // VULHUB: VHN-90116 // VULMON: CVE-2016-1297

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-01337

AFFECTED PRODUCTS

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(2.1\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(2.0\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(1.0\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(3.0\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(1.1\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(1.2\)

Trust: 1.6

vendor:ciscomodel:application control engine softwarescope:eqversion:a5\(2.1e\)

Trust: 1.6

vendor:ciscomodel:application control enginescope:ltversion:a5

Trust: 0.8

vendor:ciscomodel:application control enginescope:eqversion:4710 a5(3.1)

Trust: 0.8

vendor:ciscomodel:ace application control enginescope:eqversion:4710

Trust: 0.6

sources: CNVD: CNVD-2016-01337 // JVNDB: JVNDB-2016-001784 // CNNVD: CNNVD-201602-460 // NVD: CVE-2016-1297

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1297
value: HIGH

Trust: 1.0

NVD: CVE-2016-1297
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-01337
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201602-460
value: CRITICAL

Trust: 0.6

VULHUB: VHN-90116
value: HIGH

Trust: 0.1

VULMON: CVE-2016-1297
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1297
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-01337
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90116
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1297
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2016-01337 // VULHUB: VHN-90116 // VULMON: CVE-2016-1297 // JVNDB: JVNDB-2016-001784 // CNNVD: CNNVD-201602-460 // NVD: CVE-2016-1297

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-90116 // JVNDB: JVNDB-2016-001784 // NVD: CVE-2016-1297

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201602-460

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201602-460

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001784

PATCH

title:cisco-sa-20160224-aceurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160224-ace

Trust: 0.8

title:Patch for the CiscoACE4710ApplicationControlEngine command injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/71927

Trust: 0.6

title:Cisco Application Control Engine 4700 Device Manager GUI Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60324

Trust: 0.6

title:Cisco: Cisco ACE 4710 Application Control Engine Command Injection Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160224-ace

Trust: 0.1

sources: CNVD: CNVD-2016-01337 // VULMON: CVE-2016-1297 // JVNDB: JVNDB-2016-001784 // CNNVD: CNNVD-201602-460

EXTERNAL IDS

db:NVDid:CVE-2016-1297

Trust: 3.2

db:SECTRACKid:1035104

Trust: 1.2

db:JVNDBid:JVNDB-2016-001784

Trust: 0.8

db:CNNVDid:CNNVD-201602-460

Trust: 0.7

db:CNVDid:CNVD-2016-01337

Trust: 0.6

db:BIDid:83390

Trust: 0.1

db:VULHUBid:VHN-90116

Trust: 0.1

db:VULMONid:CVE-2016-1297

Trust: 0.1

sources: CNVD: CNVD-2016-01337 // VULHUB: VHN-90116 // VULMON: CVE-2016-1297 // JVNDB: JVNDB-2016-001784 // CNNVD: CNNVD-201602-460 // NVD: CVE-2016-1297

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160224-ace

Trust: 2.5

url:http://www.securitytracker.com/id/1035104

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1297

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1297

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/78.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-01337 // VULHUB: VHN-90116 // VULMON: CVE-2016-1297 // JVNDB: JVNDB-2016-001784 // CNNVD: CNNVD-201602-460 // NVD: CVE-2016-1297

SOURCES

db:CNVDid:CNVD-2016-01337
db:VULHUBid:VHN-90116
db:VULMONid:CVE-2016-1297
db:JVNDBid:JVNDB-2016-001784
db:CNNVDid:CNNVD-201602-460
db:NVDid:CVE-2016-1297

LAST UPDATE DATE

2025-04-13T23:42:02.229000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-01337date:2016-03-01T00:00:00
db:VULHUBid:VHN-90116date:2016-12-06T00:00:00
db:VULMONid:CVE-2016-1297date:2016-12-06T00:00:00
db:JVNDBid:JVNDB-2016-001784date:2016-03-18T00:00:00
db:CNNVDid:CNNVD-201602-460date:2016-02-29T00:00:00
db:NVDid:CVE-2016-1297date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-01337date:2016-03-01T00:00:00
db:VULHUBid:VHN-90116date:2016-02-26T00:00:00
db:VULMONid:CVE-2016-1297date:2016-02-26T00:00:00
db:JVNDBid:JVNDB-2016-001784date:2016-03-18T00:00:00
db:CNNVDid:CNNVD-201602-460date:2016-02-25T00:00:00
db:NVDid:CVE-2016-1297date:2016-02-26T05:59:00.130