Lucene search

K
symantecSymantec Security ResponseSMNTC-110932
HistoryNov 20, 2019 - 12:00 a.m.

Cisco Unity Express CVE-2019-15986 Local Command Injection Vulnerability

2019-11-2000:00:00
Symantec Security Response
www.symantec.com
10

0.0004 Low

EPSS

Percentile

5.2%

Description

Cisco Unity Express is prone to a local command-injection vulnerability. A local attacker can exploit this issue to execute arbitrary commands on the underlying OS with root privileges. This issue is being tracked by Cisco Bug ID CSCvq54120. Versions prior to Cisco Unity Express 10.1 are vulnerable.

Technologies Affected

  • Cisco Unity Express 1.1(1)
  • Cisco Unity Express 10
  • Cisco Unity Express 2.1(1)
  • Cisco Unity Express 2.2(2)
  • Cisco Unity Express 2.3(1)
  • Cisco Unity Express 4.0
  • Cisco Unity Express 4.2
  • Cisco Unity Express 7.0
  • Cisco Unity Express 7.0.1
  • Cisco Unity Express 8.0
  • Cisco Unity Express 9.0(3)
  • Cisco Unity Express 9.0.0
  • Cisco Unity Express 9.0.6

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Restrict local access to trusted and accountable individuals only.

Run all software as a nonprivileged user with minimal access rights.
To limit the impact of latent vulnerabilities, configure servers and other applications to run as a nonadministrative user with minimal access rights.

Updates are available. Please see the references or vendor advisory for more information.

References

0.0004 Low

EPSS

Percentile

5.2%

Related for SMNTC-110932