Lucene search

K
ciscoCiscoCISCO-SA-20151209-ERW
HistoryDec 10, 2015 - 7:30 a.m.

Cisco Emergency Responder Web Framework Arbitrary File Upload Vulnerability

2015-12-1007:30:00
tools.cisco.com
19

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

45.5%

A vulnerability in the web framework of Cisco Emergency Responder (CER) could allow an unauthenticated, remote attacker to upload arbitrary files to a restricted location on the filesystem.

The vulnerability is due to insufficient parameter validation. An attacker could exploit this vulnerability by sending a crafted request to the server. An exploit could allow the attacker to upload arbitrary files to arbitrary locations on an affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that mitigate this vulnerability.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-erw[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-erw”]

Affected configurations

Vulners
Node
ciscoemergency_responderMatchany
OR
ciscoemergency_responderMatchany
VendorProductVersionCPE
ciscoemergency_responderanycpe:2.3:a:cisco:emergency_responder:any:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

45.5%

Related for CISCO-SA-20151209-ERW