Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.140311
Kategorie:CISCO
Titel:Cisco Unified Communications Manager Horizontal Privilege Escalation Vulnerability (cisco-sa-20170816-ucm)
Zusammenfassung:A vulnerability in configuration modification permissions; validation for Cisco Unified Communications Manager could allow an authenticated, remote attacker; to perform a horizontal privilege escalation where one user can modify another user's; configuration.
Beschreibung:Summary:
A vulnerability in configuration modification permissions
validation for Cisco Unified Communications Manager could allow an authenticated, remote attacker
to perform a horizontal privilege escalation where one user can modify another user's
configuration.

Vulnerability Insight:
The vulnerability is due to lack of proper Role Based Access
Control (RBAC) when certain user configuration changes are requested. An attacker could exploit
this vulnerability by sending an authenticated, crafted HTTP request to the targeted
application.

Vulnerability Impact:
An exploit could allow the attacker to impact the integrity of
the application where one user can modify the configuration of another user's information.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-6785
BugTraq ID: 100375
http://www.securityfocus.com/bid/100375
Cisco Security Advisory: 20170816 Cisco Unified Communications Manager Horizontal Privilege Escalation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-ucm
http://www.securitytracker.com/id/1039184
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.