Lucene search

K
ciscoCiscoCISCO-SA-20150130-CVE-2015-0597
HistoryJan 30, 2015 - 9:26 p.m.

Cisco WebEx Meetings Server User Enumeration Vulnerability

2015-01-3021:26:10
tools.cisco.com
17

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

61.2%

A vulnerability in the Forgot Password process of the Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to enumerate a valid administrator account.

The vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by submitting crafted packets to a vulnerable device.

Cisco has confirmed the vulnerability in a security notice and released updated software.

To exploit the vulnerability, the attacker may need access to trusted or internal networks to transmit crafted packets to the targeted system. This access requirement could limit the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscowebex_meetings_serverMatchany
OR
ciscowebex_meetings_serverMatchany
VendorProductVersionCPE
ciscowebex_meetings_serveranycpe:2.3:a:cisco:webex_meetings_server:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.002

Percentile

61.2%

Related for CISCO-SA-20150130-CVE-2015-0597