You are here
Home > Preporuke > Ranjivost Cisco Prime Collaboration Provisioning aplikacije

Ranjivost Cisco Prime Collaboration Provisioning aplikacije

  • Detalji os-a: WN7
  • Važnost: URG
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Prime Collaboration Provisioning Unauthenticated Remote Method Invocation Vulnerability

Advisory ID: cisco-sa-20180606-prime-rmi

Revision: 1.0

For Public Release: 2018 June 6 16:00 GMT

Last Updated: 2018 June 6 16:00 GMT

CVE ID(s): CVE-2018-0321

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+———————————————————————

Summary

=======

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to access the Java Remote Method Invocation (RMI) system.

The vulnerability is due to an open port in the Network Interface and Configuration Engine (NICE) service. An attacker could exploit this vulnerability by accessing the open RMI system on an affected PCP instance. An exploit could allow the attacker to perform malicious actions that affect PCP and the devices that are connected to it.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-rmi [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-rmi”]

—–BEGIN PGP SIGNATURE—–
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=loss
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorAndrej Sefic
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top