First published: Thu May 21 2009(Updated: )
Directory traversal vulnerability in the TFTP service in Cisco CiscoWorks Common Services (CWCS) 3.0.x through 3.2.x on Windows, as used in Cisco Unified Service Monitor, Security Manager, TelePresence Readiness Assessment Manager, Unified Operations Manager, Unified Provisioning Manager, and other products, allows remote attackers to access arbitrary files via unspecified vectors.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco CiscoWorks Common Services | =3.0.3 | |
Cisco CiscoWorks Common Services | =3.0.4 | |
Cisco CiscoWorks Common Services | =3.0.5 | |
Cisco CiscoWorks Common Services | =3.0.6 | |
Cisco CiscoWorks Common Services | =3.1 | |
Cisco CiscoWorks Common Services | =3.1.1 | |
Cisco CiscoWorks Common Services | =3.2 | |
Cisco Ciscoworks Health And Utilization Monitor | =1.0 | |
Cisco Ciscoworks Health And Utilization Monitor | =1.1 | |
Cisco Ciscoworks Lan Management Solution | =2.5 | |
Cisco Ciscoworks Lan Management Solution | =2.6 | |
Cisco Ciscoworks Lan Management Solution | =3.0 | |
Cisco Ciscoworks Lan Management Solution | =3.1 | |
Cisco Ciscoworks Qos Policy Manager | =4.0 | |
Cisco Ciscoworks Qos Policy Manager | =4.1 | |
Cisco Ciscoworks Voice Manager | =3.0 | |
Cisco Ciscoworks Voice Manager | =3.1 | |
Cisco Security Manager | =3.0 | |
Cisco Security Manager | =3.1 | |
Cisco Security Manager | =3.2 | |
Cisco Telepresence Readiness Assessment Manager | =1.0 | |
Cisco Unified Operations Manager | =1.0 | |
Cisco Unified Operations Manager | =1.1 | |
Cisco Unified Operations Manager | =2.0 | |
Cisco Unified Operations Manager | =2.1 | |
Cisco Unified Provisioning Manager | =1.0 | |
Cisco Unified Provisioning Manager | =1.1 | |
Cisco Unified Provisioning Manager | =1.2 | |
Cisco Unified Provisioning Manager | =1.3 | |
Cisco Unified Service Monitor | =1.0 | |
Cisco Unified Service Monitor | =1.1 | |
Cisco Unified Service Monitor | =2.0 | |
Cisco Unified Service Monitor | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.