Lucene search

K
ciscoCiscoCISCO-SA-20140828-CVE-2014-3345
HistoryAug 28, 2014 - 3:27 p.m.

Cisco Transport Gateway for Smart Call Home Unauthorized Configuration Change Vulnerability

2014-08-2815:27:35
tools.cisco.com
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.7%

A vulnerability in the web framework code of Cisco Transport Gateway for Smart Call Home (TG-SCH) could allow an unauthenticated, remote attacker to make certain changes to the system.

The vulnerability is due to improper implementation of authorization controls when accessing certain administrative web pages of the application. An attacker could exploit this vulnerability by submitting a crafted URL to the affected system.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscotransport_gateway_installation_softwareMatchany
OR
ciscotransport_gateway_installation_softwareMatchany

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.7%

Related for CISCO-SA-20140828-CVE-2014-3345