{"vuid":"VU#952422","idnumber":"952422","name":"Cisco Identity Services Engine contains an input validation vulnerability","keywords":["Cisco","Identity Services Engine","privilege escalation","command injection","CWE-20"],"overview":"Cisco Identity Services Engine contains an input validation vulnerability (CWE-20).","clean_desc":"CWE-20: Improper Input Validation Cisco Identity Services Engine (ISE) contains an input validation vulnerability. The ISE device contains a TCP Dump option for analyzing traffic on the device. By using a proxy to modify the HTTP request, a remote authenticated attacker can encode commands into the vulnerable format parameter which could allow them to run arbitrary code on the affected system with the privilege of the root user.","impact":"A remote authenticated attacker may be able to execute arbitrary code as root on the device.","resolution":"Apply an Update Users are advised to refer to the \"Software Versions and Fixes\" section of the Cisco Security Advisory for details on which update is appropriate for their version of the Identity Services Engine.","workarounds":"","sysaffected":"","thanks":"Thanks to Stephen Hosom for reporting this vulnerability. Cisco also credits Jan Kadijk from Warpnet for first directly reporting this vulnerability.","author":"This document was written by Adam Rauf.","public":["http://cwe.mitre.org/data/definitions/20.html","http://www.cisco.com/en/US/products/ps11640/index.html","http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-ise"],"cveids":["CVE-2013-5530"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-09-18T18:28:05Z","publicdate":"2013-10-23T00:00:00Z","datefirstpublished":"2013-10-28T12:28:01Z","dateupdated":"2013-11-12T15:03:34Z","revision":43,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"L","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9","cvss_basevector":"AV:N/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"7.4","cvss_environmentalscore":"1.9","cvss_environmentalvector":"CDP:ND/TD:L/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}