Lucene search

K
ciscoCiscoCISCO-SA-20190501-EXPRESSWAY-TRAVERSAL
HistoryMay 01, 2019 - 4:00 p.m.

Cisco Expressway Series Directory Traversal Vulnerability

2019-05-0116:00:00
tools.cisco.com
35

0.004 Low

EPSS

Percentile

74.9%

A vulnerability in the management web interface of Cisco Expressway Series could allow an authenticated, remote attacker to perform a directory traversal attack against an affected device.

The vulnerability is due to insufficient input validation on the web interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to bypass security restrictions and access the web interface of a Cisco Unified Communications Manager associated with the affected device. Valid credentials would still be required to access the Cisco Unified Communications Manager interface.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-expressway-traversal”]

Affected configurations

Vulners
Node
ciscoexpresswayMatchany
OR
ciscoexpresswayMatchany
CPENameOperatorVersion
cisco expresswayeqany
cisco expresswayeqany

0.004 Low

EPSS

Percentile

74.9%

Related for CISCO-SA-20190501-EXPRESSWAY-TRAVERSAL