Lucene search

K
ciscoCiscoCISCO-SA-UCM-FILE-READ-QGJHEC3A
HistoryJul 06, 2022 - 4:00 p.m.

Cisco Unified Communications Manager Arbitrary File Read Vulnerability

2022-07-0616:00:00
tools.cisco.com
34
cisco
unified communications manager
arbitrary file read
vulnerability
web-based management
directory traversal
software updates
security advisory

EPSS

0.001

Percentile

38.6%

A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device.

This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the operating system.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-qgjhEc3A [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-file-read-qgjhEc3A”]

Affected configurations

Vulners
Node
ciscounified_communications_managerMatchany
OR
ciscounified_communications_managerMatchany
VendorProductVersionCPE
ciscounified_communications_manageranycpe:2.3:a:cisco:unified_communications_manager:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

38.6%

Related for CISCO-SA-UCM-FILE-READ-QGJHEC3A