First published: Wed Dec 15 2004(Updated: )
Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Server | =2.2 | |
Cisco Unity Server | =3.0 | |
Cisco Unity Server | =3.1 | |
Cisco Unity Server | =3.3 | |
Cisco Unity Server | =2.3 | |
Cisco Unity Server | =3.2 | |
Cisco Unity Server | =2.1 | |
Cisco Unity Server | =2.46 | |
Cisco Unity Server | =2.4 | |
Cisco Unity Server | =2.0 | |
Cisco Unity Server | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1322 is classified as a high-severity vulnerability due to its potential for unauthorized access.
To fix CVE-2004-1322, update your Cisco Unity Server to a patched version that removes the hard-coded usernames and passwords.
CVE-2004-1322 affects Cisco Unity Server versions 2.x, 3.x, and 4.x.
Yes, CVE-2004-1322 can lead to data breaches as attackers can access and manipulate email content.
Yes, CVE-2004-1322 can be exploited remotely, allowing attackers to gain unauthorized access to the system.