CVE-2013-1185

The web interface in the Manager component in Cisco Unified Computing System (UCS) 1.x and 2.x before 2.0(2m) allows remote attackers to obtain sensitive information by reading a (1) technical-support bundle file or (2) on-device configuration backup, aka Bug ID CSCtq86543.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\(2k\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\(1m\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\(1a\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\(1d\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1c\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1m\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1n\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1o\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1p\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1q\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1t\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1w\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\(1y\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(1j\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(1m\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3i\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3l\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3m\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3q\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3s\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3u\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(3y\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(4f\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(4g\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(4i\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(4j\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\(4k\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\(1q\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\(1s\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\(1t\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\(1w\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\(1x\):*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:unified_computing_system_integrated_management_controller:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2013-04-25 10:55

Updated : 2024-02-04 18:16


NVD link : CVE-2013-1185

Mitre link : CVE-2013-1185

CVE.ORG link : CVE-2013-1185


JSON object : View

Products Affected

cisco

  • unified_computing_system_6120xp_fabric_interconnect
  • unified_computing_system_6296up_fabric_interconnect
  • unified_computing_system_6140xp_fabric_interconnect
  • unified_computing_system_integrated_management_controller
  • unified_computing_system_infrastructure_and_unified_computing_system_software
  • unified_computing_system_6248up_fabric_interconnect
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor