Cisco Video Surveillance Manager Multiple Vulnerabilities (cisco-sa-20130724-vsm)

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

According to its self-reported version, the version of Cisco Video
Surveillance Manager installed on the remote host is affected by
multiple vulnerabilities :

- The application is affected by a directory traversal
vulnerability because Cisco VSM does not properly
validate user-supplied input to the
'monitor/logselect.php' and 'read_log.jsp' scripts.
This can allow a remote, unauthorized attacker to gain
access to arbitrary files on the remote host by sending
a specially crafted request. (CVE-2013-3429)

- The application allows access to sensitive data without
requiring authentication. Data such as configuration,
monitoring pages archives, and system logs can be
accessed by attackers without requiring authentication.
(CVE-2013-3430, CVE-2013-3431)

See also :

Solution :

Upgrade to Cisco Video Surveillance Manager 7.0.0 or later.

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 7.4
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 69856 ()

Bugtraq ID: 61430

CVE ID: CVE-2013-3429

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now