You are here
Home > Preporuke > Ranjivost Cisco Prime Collaboration Provisioning aplikacije

Ranjivost Cisco Prime Collaboration Provisioning aplikacije

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Prime Collaboration Provisioning Access Control Vulnerability

Advisory ID: cisco-sa-20180606-prime-access

Revision: 1.0

For Public Release: 2018 June 6 16:00 GMT

Last Updated: 2018 June 6 16:00 GMT

CVE ID(s): CVE-2018-0322

CVSS Score v(3): 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in the web management interface of Cisco Prime Collaboration Provisioning (PCP) could allow an authenticated, remote attacker to modify sensitive data that is associated with arbitrary accounts on an affected device.

The vulnerability is due to a failure to enforce access restrictions on the Help Desk and User Provisioning roles that are assigned to authenticated users. This failure could allow an authenticated attacker to modify critical attributes of higher-privileged accounts on the device. A successful exploit could allow the attacker to gain elevated privileges on the device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-access [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-access”]

—–BEGIN PGP SIGNATURE—–
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=E8Wq
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorAndrej Sefic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top