Lucene search

K
ciscoCiscoCISCO-SA-20150130-CVE-2015-0595
HistoryJan 30, 2015 - 4:59 p.m.

Cisco WebEx Meetings Server XMLAPI Vulnerability

2015-01-3016:59:52
tools.cisco.com
19

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

70.4%

A vulnerability in the XML application programming interface (API) of Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to view sensitive information.

The vulnerability is due to improper sanitization of return messages. An attacker could exploit this vulnerability by sending crafted GET requests to a vulnerable device.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker may need access to trusted, internal networks behind a firewall to send crafted GET requests to the targeted device. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscowebex_meetings_serverMatchany
OR
ciscowebex_meetings_serverMatchany
VendorProductVersionCPE
ciscowebex_meetings_serveranycpe:2.3:a:cisco:webex_meetings_server:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.003

Percentile

70.4%

Related for CISCO-SA-20150130-CVE-2015-0595