Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-2166 | First vendor Publication | 2006-05-04 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:S/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 2.1 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | High |
Cvss Expoit Score | 3.9 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2166 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 3 | |
Hardware | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25165 | Cisco Unity Express Arbitrary User Expired Password Modification Cisco Unity Express contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is triggered when the Unity Express HTTP interface allows any user to reset the password of any other user with an expired password. This flaw may lead to a loss of integrity. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:20:33 |
|
2024-11-28 12:08:52 |
|
2021-05-04 12:04:00 |
|
2021-04-22 01:04:32 |
|
2020-05-23 00:17:45 |
|
2018-10-31 00:19:45 |
|
2017-07-20 09:23:33 |
|
2016-06-28 15:45:41 |
|
2016-04-26 14:35:03 |
|
2013-05-11 10:56:07 |
|