Lucene search

K
ciscoCiscoCISCO-SA-20180620-CMS-SF
HistoryJun 20, 2018 - 4:00 p.m.

Cisco Meeting Server Session Fixation Vulnerability

2018-06-2016:00:00
tools.cisco.com
18

EPSS

0

Percentile

5.1%

A vulnerability in the session identification management functionality of the web-based management interface for Cisco Meeting Server could allow an unauthenticated, local attacker to hijack a valid user session identifier.

The vulnerability exists because the affected application does not assign a new session identifier to a user session when a user authenticates to the application. An attacker could exploit this vulnerability by using a hijacked session identifier to connect to the application through the web-based management interface. A successful exploit could allow the attacker to hijack an authenticated user’s browser session.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-cms-sf [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-cms-sf”]

Affected configurations

Vulners
Node
ciscomeeting_serverMatchany
OR
ciscomeeting_serverMatchany
VendorProductVersionCPE
ciscomeeting_serveranycpe:2.3:a:cisco:meeting_server:any:*:*:*:*:*:*:*

EPSS

0

Percentile

5.1%

Related for CISCO-SA-20180620-CMS-SF