cve-2009-0632
Vulnerability from cvelistv5
Published
2009-03-12 15:00
Modified
2024-08-07 04:40
Severity ?
EPSS score ?
Summary
The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.122Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34082", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34082" }, { "name": "52589", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52589" }, { "name": "20090311 Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml" }, { "name": "20090311 Identifying and Mitigating Exploitation of the Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html" }, { "name": "1021839", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021839" }, { "name": "cucm-pab-privilege-escalation(49196)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49196" }, { "name": "34238", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34238" }, { "name": "ADV-2009-0675", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0675" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "34082", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34082" }, { "name": "52589", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52589" }, { "name": "20090311 Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml" }, { "name": "20090311 Identifying and Mitigating Exploitation of the Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html" }, { "name": "1021839", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021839" }, { "name": "cucm-pab-privilege-escalation(49196)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49196" }, { "name": "34238", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34238" }, { "name": "ADV-2009-0675", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0675" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2009-0632", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34082", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34082" }, { "name": "52589", "refsource": "OSVDB", "url": "http://osvdb.org/52589" }, { "name": "20090311 Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml" }, { "name": "20090311 Identifying and Mitigating Exploitation of the Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html" }, { "name": "1021839", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021839" }, { "name": "cucm-pab-privilege-escalation(49196)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49196" }, { "name": "34238", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34238" }, { "name": "ADV-2009-0675", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0675" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2009-0632", "datePublished": "2009-03-12T15:00:00", "dateReserved": "2009-02-18T00:00:00", "dateUpdated": "2024-08-07T04:40:05.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E29A61E-334B-4F95-9B47-8F53A4DB3EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6C20851-DC17-4E89-A6C1-D1B52D47608F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr2b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E094AB-5F10-4238-BBE3-236B7306C995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2496F01D-E387-48CD-B586-826D284BBC2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5955E35-E200-4054-8757-39BD04F13220\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"577571D6-AC59-4A43-B9A5-7B6FC6D2046C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(1\\\\)sr.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BB09252-6C59-4E1C-93C8-0AC3ED54A294\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(2\\\\)sr1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA0F270A-F953-43C7-9358-3B237B355BB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2AF68FA-433F-46F2-B309-B60A108BECFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B9FDFF3-2E60-4E41-9251-93283D945D94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"239510AD-8BB0-4515-B1DA-80DE696D25DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26277C4A-4E27-492C-B18C-AC68D86ADF55\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2b\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9003EC1A-6E85-41F1-BB5D-B841C9C28105\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0318CF61-B892-4D44-B41A-D630B4AB808C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3c\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84A49932-1E22-4BE0-8195-926D44F65AAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3d\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DE1B0DD-EA64-493B-86B7-9057EE5033C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"819AE879-5BF9-494E-8905-1E1E867EB5A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2DF1139-A161-48DD-9929-F6939D626461\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.0\\\\(1a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF99088E-1330-4E15-8BD3-2A5172FBA460\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BC6EF34-D23D-45CA-A907-A47993CC061E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CC94003-72B6-45C3-A07E-0A08F1562B6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(1a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"958A2707-0F1A-4719-BB9F-DC9ED129105A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"597D9674-F44D-4A31-A2F2-2790ED698A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(2\\\\)su1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C2B7439-8547-41A6-AE6C-6ABCD167890E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE122F76-ECDB-4446-825C-EF02257D8C08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F2564A8-5805-46E0-B6EC-F4967D67C566\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:unified_communications_manager:7.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0907FAF-8334-42C1-B35A-EC6ED89AC110\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.\"}, {\"lang\": \"es\", \"value\": \"La funcionalidad IP Phone Personal Address Book (PAB) Synchronizer en Cisco Unified Communications Manager (tambi\\u00e9n conocido como CUCM, formalmente CallManager) v4.1, v4.2 anteriores v4.2(3)SR4b, v4.3 anteriores v4.3(2)SR1b, v5.x anteriores v5.1(3e), v6.x anteriores v6.1(3), y v7.0 anteriores v7.0(2) env\\u00eda credenciales de cuentas privilegiadas del servicio directorio a el cliente en texto plano, lo que permite a los atacantes remotos modificar la configuraci\\u00f3n CUCM y desarrollar otros acciones privilegiadas interceptando estas credenciales, y us\\u00e1ndola en peticiones no relativas a las tareas de sincronizaci\\u00f3n establecidas, como se ha demostrado a trav\\u00e9s de (1) credenciales de la cuenta DC Directory en CUCM v4.x y (2) credenciales de cuenta TabSyncSysUser en CUCM v5.x hasta v7.x.\"}]", "evaluatorImpact": "Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\r\n\r\n\"Impact\r\n\r\nSuccessful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication.\"", "id": "CVE-2009-0632", "lastModified": "2024-11-21T01:00:34.007", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2009-03-12T15:20:49.750", "references": "[{\"url\": \"http://osvdb.org/52589\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/34238\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34082\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id?1021839\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0675\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49196\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://osvdb.org/52589\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34238\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/34082\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1021839\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/0675\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/49196\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-255\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2009-0632\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2009-03-12T15:20:49.750\",\"lastModified\":\"2024-11-21T01:00:34.007\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad IP Phone Personal Address Book (PAB) Synchronizer en Cisco Unified Communications Manager (tambi\u00e9n conocido como CUCM, formalmente CallManager) v4.1, v4.2 anteriores v4.2(3)SR4b, v4.3 anteriores v4.3(2)SR1b, v5.x anteriores v5.1(3e), v6.x anteriores v6.1(3), y v7.0 anteriores v7.0(2) env\u00eda credenciales de cuentas privilegiadas del servicio directorio a el cliente en texto plano, lo que permite a los atacantes remotos modificar la configuraci\u00f3n CUCM y desarrollar otros acciones privilegiadas interceptando estas credenciales, y us\u00e1ndola en peticiones no relativas a las tareas de sincronizaci\u00f3n establecidas, como se ha demostrado a trav\u00e9s de (1) credenciales de la cuenta DC Directory en CUCM v4.x y (2) credenciales de cuenta TabSyncSysUser en CUCM v5.x hasta v7.x.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E29A61E-334B-4F95-9B47-8F53A4DB3EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6C20851-DC17-4E89-A6C1-D1B52D47608F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E094AB-5F10-4238-BBE3-236B7306C995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2496F01D-E387-48CD-B586-826D284BBC2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.2\\\\(3\\\\)sr4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5955E35-E200-4054-8757-39BD04F13220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577571D6-AC59-4A43-B9A5-7B6FC6D2046C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(1\\\\)sr.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB09252-6C59-4E1C-93C8-0AC3ED54A294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:4.3\\\\(2\\\\)sr1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA0F270A-F953-43C7-9358-3B237B355BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2AF68FA-433F-46F2-B309-B60A108BECFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9FDFF3-2E60-4E41-9251-93283D945D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"239510AD-8BB0-4515-B1DA-80DE696D25DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26277C4A-4E27-492C-B18C-AC68D86ADF55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(2b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9003EC1A-6E85-41F1-BB5D-B841C9C28105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0318CF61-B892-4D44-B41A-D630B4AB808C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A49932-1E22-4BE0-8195-926D44F65AAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:5.1\\\\(3d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE1B0DD-EA64-493B-86B7-9057EE5033C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"819AE879-5BF9-494E-8905-1E1E867EB5A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DF1139-A161-48DD-9929-F6939D626461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.0\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF99088E-1330-4E15-8BD3-2A5172FBA460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BC6EF34-D23D-45CA-A907-A47993CC061E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CC94003-72B6-45C3-A07E-0A08F1562B6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"958A2707-0F1A-4719-BB9F-DC9ED129105A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"597D9674-F44D-4A31-A2F2-2790ED698A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(2\\\\)su1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2B7439-8547-41A6-AE6C-6ABCD167890E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:6.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE122F76-ECDB-4446-825C-EF02257D8C08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2564A8-5805-46E0-B6EC-F4967D67C566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:unified_communications_manager:7.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0907FAF-8334-42C1-B35A-EC6ED89AC110\"}]}]}],\"references\":[{\"url\":\"http://osvdb.org/52589\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://secunia.com/advisories/34238\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34082\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id?1021839\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0675\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49196\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://osvdb.org/52589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34238\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/34082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1021839\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/0675\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/49196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml\\r\\n\\r\\n\\\"Impact\\r\\n\\r\\nSuccessful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication.\\\"\"}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.