CVE-2013-3430
Published on: 07/25/2013 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:28:30 PM UTC
Certain versions of Video Surveillance Manager from Cisco contain the following vulnerability:
Cisco Video Surveillance Manager (VSM) before 7.0.0 allows remote attackers to obtain sensitive configuration, archive, and log information via unspecified vectors, related to the Cisco_VSBWT (aka Broadware sample code) package, aka Bug ID CSCsv37288.
- CVE-2013-3430 has been assigned by
[email protected] to track the vulnerability
CVSS2 Score: 9 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Cisco Security Advisory: Multiple Vulnerabilities in the Cisco Video Surveillance Manager | Vendor Advisory tools.cisco.com text/html |
![]() |
IBM X-Force Exchange | exchange.xforce.ibmcloud.com text/html |
![]() |
Cisco Video Surveillance Manager CVE-2013-3430 Remote Authentication Bypass Vulnerability | cve.report (archive) text/html |
![]() |
Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information - SecurityTracker | www.securitytracker.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
- cpe:2.3:a:cisco:video_surveillance_manager:1.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:1.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:1.1.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:1.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.4:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.6:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.1.7:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.3.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:2.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.0.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.2.0:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:4.2.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.1:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:*:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr1:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr2:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:6.3.2:mr3:*:*:*:*:*:*:
- cpe:2.3:a:cisco:video_surveillance_manager:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE