CVE-2012-3063 (CNNVD-201206-378)
中文标题:
Cisco ACE安全绕过漏洞
英文标题:
Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode ...
漏洞描述
中文描述:
Cisco ACE Application Control Engine Module是美国思科(Cisco)公司新一代的负载均衡和应用交付解决方案。 Cisco Application Control Engine(ACE) A4(2.3)之前的版本和A5(1.1)之前的A5版本中存在漏洞。当启用multicontext模式时,在多个上下文中未正确分享管理IP地址。远程认证管理者可利用该漏洞通过尝试登陆到上下文在投机情况下绕过目地访问权限,读取或修改配置设置。又名Bug ID CSCts30631。
英文描述:
Cisco Application Control Engine (ACE) before A4(2.3) and A5 before A5(1.1), when multicontext mode is enabled, does not properly share a management IP address among multiple contexts, which allows remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances, and read or modify configuration settings, via a login attempt to a context, aka Bug ID CSCts30631, a different vulnerability than CVE-2012-3058.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | application_control_engine_software | * | - | - |
cpe:2.3:a:cisco:application_control_engine_software:*:*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a1\(7\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a1\(7\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a1\(7a\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a1\(7a\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a1\(7b\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a1\(7b\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a1\(8\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a1\(8\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a1\(8a\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a1\(8a\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(1.0\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(1.0\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.1\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.1\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.2\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.2\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.3\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.3\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.4\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.4\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.5\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.5\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.6\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.6\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a3\(2.7\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a3\(2.7\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a4\(1.0\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a4\(1.0\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a4\(1.1\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a4\(1.1\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a4\(2.1\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a4\(2.1\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a4\(2.2\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a4\(2.2\):*:*:*:*:*:*:*
|
| cisco | application_control_engine_software | a5\(1.0\) | - | - |
cpe:2.3:a:cisco:application_control_engine_software:a5\(1.0\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:H/Au:S/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2012-3063 |
2025-11-11 15:18:29 | 2025-11-11 07:33:24 |
| NVD | nvd_CVE-2012-3063 |
2025-11-11 14:53:57 | 2025-11-11 07:42:13 |
| CNNVD | cnnvd_CNNVD-201206-378 |
2025-11-11 15:09:16 | 2025-11-11 07:50:09 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-201206-378
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.1
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:H/Au:S/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 19
- data_sources: ['cve'] -> ['cve', 'nvd']