Lucene search

K
ciscoCiscoCISCO-SA-20150106-CVE-2014-8025
HistoryJan 06, 2015 - 9:52 p.m.

Cisco Jabber Guest Server HTML5 Response Disclosure

2015-01-0621:52:41
tools.cisco.com
12

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.7%

A vulnerability in Cisco Jabber Guest Server could allow an unauthenticated, remote attacker to disclose sensitive information on the targeted system.

The vulnerability is due to missing encryption on sensitive data passed via HTTP GET or POST methods by the affected software. An attacker could exploit this vulnerability by sniffing the data traffic on the network. If successful, the attacker could access sensitive information or conduct data replay attacks on the network.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit the vulnerability, the attacker may need to access internal networks to sniff data in the network. This access requirement could limit the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscojabber_guestMatchany
OR
ciscojabber_guestMatchany

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.7%

Related for CISCO-SA-20150106-CVE-2014-8025