CVE Vulnerabilities

CVE-2014-0732

Improper Authentication

Published: Feb 20, 2014 | Modified: Feb 21, 2014
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

The Real Time Monitoring Tool (RTMT) web application in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read application files via a direct request to a URL, aka Bug ID CSCum46495.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Unified_communications_manager Cisco * 10.0(1) (including)
Unified_communications_manager Cisco 3.3(5) (including) 3.3(5) (including)
Unified_communications_manager Cisco 3.3(5)sr1 (including) 3.3(5)sr1 (including)
Unified_communications_manager Cisco 3.3(5)sr2a (including) 3.3(5)sr2a (including)
Unified_communications_manager Cisco 4.1(3) (including) 4.1(3) (including)
Unified_communications_manager Cisco 4.1(3)sr1 (including) 4.1(3)sr1 (including)
Unified_communications_manager Cisco 4.1(3)sr2 (including) 4.1(3)sr2 (including)
Unified_communications_manager Cisco 4.1(3)sr3 (including) 4.1(3)sr3 (including)
Unified_communications_manager Cisco 4.1(3)sr4 (including) 4.1(3)sr4 (including)
Unified_communications_manager Cisco 4.2 (including) 4.2 (including)
Unified_communications_manager Cisco 4.2.1 (including) 4.2.1 (including)
Unified_communications_manager Cisco 4.2.2 (including) 4.2.2 (including)
Unified_communications_manager Cisco 4.2.3 (including) 4.2.3 (including)
Unified_communications_manager Cisco 4.2.3sr1 (including) 4.2.3sr1 (including)
Unified_communications_manager Cisco 4.2.3sr2 (including) 4.2.3sr2 (including)
Unified_communications_manager Cisco 4.2.3sr2b (including) 4.2.3sr2b (including)
Unified_communications_manager Cisco 4.3 (including) 4.3 (including)
Unified_communications_manager Cisco 10.0 (including) 10.0 (including)

Potential Mitigations

References