Executive Summary
Summary | |
---|---|
Title | Cisco Prime Collaboration Provisioning Access Control Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20180606-prime-access | First vendor Publication | 2018-06-06 |
Vendor | Cisco | Last vendor Modification | 2018-06-06 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the web management interface of Cisco Prime Collaboration Provisioning (PCP) could allow an authenticated, remote attacker to modify sensitive data that is associated with arbitrary accounts on an affected device. The vulnerability is due to a failure to enforce access restrictions on the Help Desk and User Provisioning roles that are assigned to authenticated users. This failure could allow an authenticated attacker to modify critical attributes of higher-privileged accounts on the device. A successful exploit could allow the attacker to gain elevated privileges on the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-access ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-access"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJbGAZaXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfcz7SIQAMSYL8z3Pi6ujGCh97S9fhYl1Slo lyX2Uq/O0DzFKvEkwHYGDv/iYHf10t+omKe/VNhlRiusn/h4hmd7i8dSGozNaPSi TOmnjWYKx6WF/Ayj5ZTJiKUxsR+L7im/0iIOl7jHWQRGyrEt+VNvZ6vaGHluGITa RM1wi2TIDuOD06co1wj68JQ+DT6ParLtEmt7DhDEQLRJjtJvUyEHOg6dK3s7+mW7 RNI1m4CCrOtsWUqjWKiriRls+w/kwjcnwBKwkpP0d1IF3n0qR59OHMKo0XMLTLzt dpnmW8CMrC67SFFnn5n6maiqRjzcNvyHHXmwlyo+U368JHDCwJSShdH43K7XXYzJ hbHzqN41o33+Jfk9RWzBL8xaofzV2y5evWkOEcEoD5XeDHhT9+jIyVLZjPMJotyb 8fzlQUW6lK9Awak1ObWOw2RTqX2bb1y8LHj/WrCPzXD/Qu8qEXXFIsQGgFAYr4y9 OMprf4Gh52ctbCgCpor3JWSkW722e04D8VotcyIxLylellK2euAV9F69+bhcSwtE LaCTjJFB47zic9FUS4YvjYvMSGKmRPZCQ9vTHNQN2CbmJZg3uPVJ1klOQp6wzXhz 42Dd17rGJhEajHSkhEQ82ZFv+rdMwhE6iksVA0pVL7bKd7lrCnE8oRgEWJivK0/E iNTowmF1Wkbeu2s7 =E8Wq END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2018-07-20 17:21:13 |
|
2018-06-07 17:21:02 |
|
2018-06-06 21:19:14 |
|