Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Cisco Video Surveillance Manager Web-Based Management Interface Information Disclosure Vulnerability
Name cisco-sa-20190515-cvsm First vendor Publication 2019-05-15
Vendor Cisco Last vendor Modification 2019-05-15
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the web-based management interface of Cisco Video Surveillance Manager could allow an unauthenticated, remote attacker to access sensitive information.

The vulnerability is due to improper validation of parameters handled by the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to an affected component. A successful exploit could allow the attacker to download arbitrary files from the affected device, which could contain sensitive information.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm"]


iQJ5BAEBAgBjBQJc3DqtXBxDaXNjbyBQcm9kdWN0IFNlY3VyaXR5IEluY2lkZW50 IFJlc3BvbnNlIFRlYW0gKENpc2NvIFBTSVJUIGtleSAyMDE4LTIwMTkpIDxwc2ly dEBjaXNjby5jb20+AAoJEJa12PPJBfczTcYQAK9QCfTuGq3bLJrsPPGVYa9VHbbg tgslzgVd95r4J0Qi0VPd/6Q3kHtN/SmE4yTe5445dkgZS4CZLfot/2RWU4v8akOy iG0ypU1m/8LnipYmfNimlFazovX8K6+l/S5aVUodSwc9BsEzQMfUo3BUKXoS0j63 YUgwaatX9dFM7pAWimtopTZEdglq0t8W0tkzGionUqfetmsfioa/ReanRX637+8Z fDUMzhu6A5/o8OtEFxd34dwrmkI0Gk04rhWA380v2vV4OfndbwAu42QtywgN7SrU Mo3/1WhtGZtRXoiDrCTXXMQ0GZKt4ByzX3y274n09snt0AehEm4q92Z6smg8LbW2 +bNu74kGHr9h7ezJ7omqAJy7RZhGMrQsUBfyUUn70sAxwFgkQBYZ/R6VYijoUAOm 2DhHhnMqip3UiDgUDky9a1qfPXXrFnQxrA4FH94X0QsgPoOgSQiJ87QEvVU+4nIb HBMEvwEDtD2T5XWUQSL1D0sfMfDvr/eobidIH496Qk5jPlu7yCp0SrLs8ZqZmnv4 plCcIxhVkNsa2be+iXEiRKRXBRjrURyjkTD1ndRuDPbZ3Pg/PBev2RCE3SeS6jkV t/SrhkUsAe/yajX5ogs+VvzskcyGkJOW3EO9CS1g6tkDAUdyytyi+01IYjpnHuW3 9HYyJtw3PG8ftH0/ =czRC END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Application 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-05-17 00:21:33
  • Multiple Updates
2019-05-15 21:21:59
  • Multiple Updates
2019-05-15 21:18:29
  • First insertion