Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1322 | First vendor Publication | 2004-12-15 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1322 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12408 | Cisco Unity With Microsoft Exchange Multiple Default Accounts Cisco Unity integrated with Microsoft Exchange contains a flaw that may allow a remote attacker to gain access to unauthorized privileges. The issue is triggered due to multiple default accounts with well-known usernames and passwords, which may allow a remote attacker to gain administrative access resulting in a loss of integrity. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:51 |
|
2024-11-28 12:06:19 |
|
2021-05-04 12:02:29 |
|
2021-04-22 01:02:40 |
|
2020-05-23 00:15:59 |
|
2017-07-11 12:01:35 |
|
2013-05-11 11:44:45 |
|