Lucene search

K
ciscoCiscoCISCO-SA-20140226-CVE-2014-0747
HistoryFeb 26, 2014 - 5:02 p.m.

Cisco Unified Communications Manager CAPF CLI Command Injection Vulnerability

2014-02-2617:02:24
tools.cisco.com
15

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

A vulnerability in the Certificate Authority Proxy Function (CAPF) command-line interface (CLI) of Cisco Unified Communications Manager (Cisco Unified CM) could allow an authenticated, local attacker to inject commands into the underlying operating system.

The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by injecting commands into certain CAPF commands. An exploit could allow the attacker to perform operations on the underlying operating system.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit this vulnerability, an attacker would need local access to the targeted device. This access requirement decreases the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscounified_communications_managerMatchany
OR
ciscounified_communications_managerMatchany
VendorProductVersionCPE
ciscounified_communications_manageranycpe:2.3:a:cisco:unified_communications_manager:any:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:S/C:C/I:C/A:C

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20140226-CVE-2014-0747