Executive Summary
Summary | |
---|---|
Title | Cisco Video Surveillance Manager Web-Based Management Interface Information Disclosure Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20190515-cvsm | First vendor Publication | 2019-05-15 |
Vendor | Cisco | Last vendor Modification | 2019-05-15 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the web-based management interface of Cisco Video Surveillance Manager could allow an unauthenticated, remote attacker to access sensitive information. The vulnerability is due to improper validation of parameters handled by the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to an affected component. A successful exploit could allow the attacker to download arbitrary files from the affected device, which could contain sensitive information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm"] BEGIN PGP SIGNATURE iQJ5BAEBAgBjBQJc3DqtXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczTcYQAK9QCfTuGq3bLJrsPPGVYa9VHbbg tgslzgVd95r4J0Qi0VPd/6Q3kHtN/SmE4yTe5445dkgZS4CZLfot/2RWU4v8akOy iG0ypU1m/8LnipYmfNimlFazovX8K6+l/S5aVUodSwc9BsEzQMfUo3BUKXoS0j63 YUgwaatX9dFM7pAWimtopTZEdglq0t8W0tkzGionUqfetmsfioa/ReanRX637+8Z fDUMzhu6A5/o8OtEFxd34dwrmkI0Gk04rhWA380v2vV4OfndbwAu42QtywgN7SrU Mo3/1WhtGZtRXoiDrCTXXMQ0GZKt4ByzX3y274n09snt0AehEm4q92Z6smg8LbW2 +bNu74kGHr9h7ezJ7omqAJy7RZhGMrQsUBfyUUn70sAxwFgkQBYZ/R6VYijoUAOm 2DhHhnMqip3UiDgUDky9a1qfPXXrFnQxrA4FH94X0QsgPoOgSQiJ87QEvVU+4nIb HBMEvwEDtD2T5XWUQSL1D0sfMfDvr/eobidIH496Qk5jPlu7yCp0SrLs8ZqZmnv4 plCcIxhVkNsa2be+iXEiRKRXBRjrURyjkTD1ndRuDPbZ3Pg/PBev2RCE3SeS6jkV t/SrhkUsAe/yajX5ogs+VvzskcyGkJOW3EO9CS1g6tkDAUdyytyi+01IYjpnHuW3 9HYyJtw3PG8ftH0/ =czRC END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Snort® IPS/IDS
Date | Description |
---|---|
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50136 - Revision : 1 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50135 - Revision : 1 - Type : SERVER-WEBAPP |
2020-12-05 | Cisco Video Surveillance Manager directory traversal attempt RuleID : 50134 - Revision : 1 - Type : SERVER-WEBAPP |
Alert History
Date | Informations |
---|---|
2020-12-05 21:23:46 |
|
2019-05-17 00:21:33 |
|
2019-05-15 21:21:59 |
|
2019-05-15 21:18:29 |
|