VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-090303-001     ( CVE-2009-0615. | CVE-2009-0616 )
Cisco Security Advisory: Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities
http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml

Multiple vulnerabilities exist in the Cisco Application Networking Manager (ANM) and Cisco Application Control Engine (ACE) Device Manager applications. These vulnerabilities are independent of each other. Successful exploitation of these vulnerabilities may result in unauthorized system or host operating system access.




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2009-03-03
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2009-03-03




脆弱性の影響を受ける製品の識別子
lapt:/a:cisco:ace_application_control_engine_device_manager     (Cisco Application Control Engine (ACE) Device Manager)
lapt:/a:cisco:anm_application_networking_manager     (Cisco Application Networking Manager (ANM))
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
同一セグメント上 [?]
X インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

X 一般ユーザアカウント [?]
フリーアカウント [?]
不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

簡単 [?]
X 不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
X 公式パッチ有り [?]

公式回避策有り [?]
非公式回避策・パッチ有り [?]
なし [?]

[インシデントの発生状況] [?]
X 活動なし [?]

Exploit/PoCあり [?]
活動あり [?]

関連情報
Common Vulnerabilities and Exposures (CVE) CVE-2009-0615.
Directory traversal vulnerability in Cisco Application Networking Manager (ANM) before 2.0 and Application Control Engine (ACE) Device Manager before A3(2.1) allows remote authenticated users to read or modify arbitrary files via unspecified vectors, related to "invalid directory permissions."




Common Vulnerabilities and Exposures (CVE) CVE-2009-0616
Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation."








参考情報

Copyright © 2008 JPCERT/CC All Rights Reserved.