CVE-2016-1290
Published Apr 6, 2016
Last updated 5 years ago
Overview
- Description
- The web API in Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allows remote authenticated users to bypass intended RBAC restrictions and gain privileges via an HTTP request that is inconsistent with a pattern filter, aka Bug ID CSCuy10227.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C057764-0A1B-41A9-A21B-F665480145AD" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA72A91C-0E65-420A-9DBE-3E0853EDB7C5" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2.0.103:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B257E2F8-30EB-4BCC-8ACF-35DF73107AAC" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B48C1E6-7C18-4C6B-B402-9C0E1A931C2C" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B64A7FCA-1DEA-45B2-9C69-CCDCC848D9B3" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.3.0.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E78D776C-AA8C-471D-A0C0-02428FA07A29" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D3206E7-DC91-4861-AD32-46DA82509D5B" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.0.45:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1704AC8E-BD7E-4882-8BB3-45B9E2AE0F10" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9ACB00E7-41E3-4221-8400-A279A75FD355" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "853315C7-01A7-4E83-9CBB-D45F6B5C4664" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB157A80-3A03-4B8D-9B20-C456A953CF7E" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7678B118-E00C-4B1E-8B40-D3233DE3615C" }, { "criteria": "cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56394A07-6D74-4588-8C05-DE04959F7FC7" }, { "criteria": "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09B35C0E-6CBA-4B6B-BCD2-F5CC0BF8CF53" } ], "operator": "OR" } ] } ]