Vulnerabilities > CVE-2013-1104 - Unspecified vulnerability in Cisco products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 8 | |
OS | 1 |
Nessus
NASL family | CISCO |
NASL id | CISCO-SA-20130123-WLC.NASL |
description | The remote Cisco Wireless LAN Controller (WLC) is affected by one or more of the following vulnerabilities : - Wireless Intrusion Prevention System (wIPS) Denial of Service Vulnerability (CSCtx80743) - Session Initiation Protocol Denial of Service Vulnerability (CSCts87659) - Remote Code Execution Vulnerability (CSCuc15636) - SNMP Unauthorized Access Vulnerability (CSCua60653) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 70124 |
published | 2013-09-25 |
reporter | This script is Copyright (C) 2013-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/70124 |
title | Multiple Vulnerabilities in Cisco Wireless LAN Controllers (cisco-sa-20130123-wlc) |
code |
|
References
- http://osvdb.org/89533
- http://osvdb.org/89533
- http://secunia.com/advisories/51965
- http://secunia.com/advisories/51965
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc
- http://www.securityfocus.com/bid/57524
- http://www.securityfocus.com/bid/57524
- http://www.securitytracker.com/id/1028027
- http://www.securitytracker.com/id/1028027
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81489
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81489