First published: Thu May 04 2006(Updated: )
Unspecified vulnerability in the HTTP management interface in Cisco Unity Express (CUE) 2.2(2) and earlier, when running on any CUE Advanced Integration Module (AIM) or Network Module (NM), allows remote authenticated attackers to reset the password for any user with an expired password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Express | =1.1.1 | |
Cisco Unity Express | =2.2.2 | |
Cisco Unity Express | =2.1.1 | |
Cisco Unity Express |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-2166 is rated as low.
To fix CVE-2006-2166, update Cisco Unity Express to a version that is not vulnerable, such as 2.2.3 or later.
CVE-2006-2166 allows remote authenticated attackers to reset the password for any user with an expired password.
CVE-2006-2166 affects Cisco Unity Express versions 1.1.1, 2.1.1, and 2.2.2.
There are no specific workarounds provided for CVE-2006-2166; upgrading is the recommended course of action.