VAR-201505-0185
Vulnerability from variot - Updated: 2023-12-18 12:57Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596. Vendors have confirmed this vulnerability Bug ID CSCut04596 It is released as.A third party may be able to hijack the authentication of any user. Exploiting these issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible. These issues are being tracked by Cisco bug ID's CSCut04596, CSCuw95626 and CSCva27600. The platform provides functions such as secure access authentication and real-time fault analysis
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201505-0185",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "hosted collaboration solution",
"scope": "lte",
"trust": 1.0,
"vendor": "cisco",
"version": "10.6\\(1\\)"
},
{
"model": "prime central for hosted collaboration solution",
"scope": "lte",
"trust": 0.8,
"vendor": "cisco",
"version": "10.6(1)"
},
{
"model": "hosted collaboration solution",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "10.6\\(1\\)"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:hosted_collaboration_solution:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "10.6\\(1\\)",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0741"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "74754"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0741",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2015-0741",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-78687",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-0741",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201505-457",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-78687",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78687"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596. Vendors have confirmed this vulnerability Bug ID CSCut04596 It is released as.A third party may be able to hijack the authentication of any user. \nExploiting these issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected user. Other attacks are also possible. \nThese issues are being tracked by Cisco bug ID\u0027s CSCut04596, CSCuw95626 and CSCva27600. The platform provides functions such as secure access authentication and real-time fault analysis",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "BID",
"id": "74754"
},
{
"db": "VULHUB",
"id": "VHN-78687"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0741",
"trust": 2.8
},
{
"db": "BID",
"id": "74754",
"trust": 1.4
},
{
"db": "SECTRACK",
"id": "1032380",
"trust": 1.1
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457",
"trust": 0.7
},
{
"db": "SECUNIA",
"id": "64618",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-78687",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78687"
},
{
"db": "BID",
"id": "74754"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"id": "VAR-201505-0185",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-78687"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:57:47.077000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "38927",
"trust": 0.8,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38927"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78687"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38927"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/74754"
},
{
"trust": 1.1,
"url": "http://www.securitytracker.com/id/1032380"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0741"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0741"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/64618"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78687"
},
{
"db": "BID",
"id": "74754"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-78687"
},
{
"db": "BID",
"id": "74754"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-05-21T00:00:00",
"db": "VULHUB",
"id": "VHN-78687"
},
{
"date": "2015-05-20T00:00:00",
"db": "BID",
"id": "74754"
},
{
"date": "2015-05-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"date": "2015-05-21T10:59:00.067000",
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"date": "2015-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-01-06T00:00:00",
"db": "VULHUB",
"id": "VHN-78687"
},
{
"date": "2016-07-06T15:10:00",
"db": "BID",
"id": "74754"
},
{
"date": "2015-05-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-002768"
},
{
"date": "2017-01-06T17:03:08.377000",
"db": "NVD",
"id": "CVE-2015-0741"
},
{
"date": "2015-05-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Prime Central for Hosted Collaboration Solution Vulnerable to cross-site request forgery",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-002768"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201505-457"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…