Lucene search

K
ciscoCiscoCISCO-SA-20120810-CVE-2012-2490
HistoryAug 10, 2012 - 9:56 p.m.

Cisco IP Communicator Certificate Trust List Man-in-the-Middle Attack Vulnerability

2012-08-1021:56:35
tools.cisco.com
15

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

30.7%

Cisco IP Communicator contains a vulnerability that could allow an unauthenticated, remote attacker to conduct man-in-the-middle attacks on a targeted system.

The vulnerability is due insufficient validation of signing certificates in the Certificate Trust List which have been accepted by end users. An unauthenticated, remote attacker could exploit this vulnerability by impersonating trusted servers through crafted certificates. If successful, the attacker could launch further attacks on the system.

Cisco has confirmed this vulnerability and released software updates.

To successfully exploit this vulnerability, Cisco IP Communicator must be restarted. An attacker may use misleading language or instructions to convince a user to restart the device, or may use other means or attacks in an attempt to restart the device.

The CVSS score indicates that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoip_communicatorMatchany
OR
ciscoip_communicatorMatchany

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

30.7%

Related for CISCO-SA-20120810-CVE-2012-2490