First published: Thu Jun 10 2010(Updated: )
Directory traversal vulnerability in the bootstrap service in Cisco Unified Contact Center Express (UCCX) 7.0 before 7.0(1)SR4 and 7.0(2), unspecified 6.0 versions, and 5.0 before 5.0(2)SR3 allows remote attackers to read arbitrary files via a crafted bootstrap message to TCP port 6295.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express Enhanced | =7.0 | |
Cisco Unified Contact Center Express Enhanced | =5.0 | |
Cisco Unified Contact Center Express Enhanced | =6.0 | |
Cisco customer response solution | =7.0 | |
Cisco customer response solution | =5.0 | |
Cisco customer response solution | =6.0 | |
Cisco IP Interactive Voice Response (IVR) | =7.0 | |
Cisco IP Interactive Voice Response (IVR) | =6.0 | |
Cisco IP Interactive Voice Response (IVR) | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1571 is considered a high severity vulnerability due to its potential for remote file access.
To fix CVE-2010-1571, you should upgrade to the latest software version as recommended by Cisco.
CVE-2010-1571 affects Cisco Unified Contact Center Express, Customer Response Solution, and Unified IP Interactive Voice Response across several versions.
Yes, CVE-2010-1571 can be exploited remotely by attackers via a crafted bootstrap message.
CVE-2010-1571 allows attackers to read arbitrary files from affected systems.