First published: Wed Feb 06 2013(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities on the Cisco Unity Express with software before 8.0 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCue35910.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Express | <=7.4 | |
Cisco Unity Express | =1.1.1 | |
Cisco Unity Express | =1.1.2 | |
Cisco Unity Express | =2.0 | |
Cisco Unity Express | =2.1 | |
Cisco Unity Express | =2.2 | |
Cisco Unity Express | =2.3 | |
Cisco Unity Express | =3.0 | |
Cisco Unity Express | =3.1 | |
Cisco Unity Express | =3.2 | |
Cisco Unity Express | =7.0 | |
Cisco Unity Express | =7.1 | |
Cisco Unity Express | =7.2 | |
Cisco Unity Express | =7.3 | |
Cisco Unity Express |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1120 is classified with a high severity due to its potential to allow attackers to hijack authentication.
To fix CVE-2013-1120, update the Cisco Unity Express software to version 8.0 or later.
CVE-2013-1120 enables attackers to perform cross-site request forgery (CSRF) attacks.
CVE-2013-1120 affects Cisco Unity Express versions prior to 8.0, including all versions from 1.1.1 to 7.4.
Users of affected Cisco Unity Express software prior to version 8.0 are vulnerable and can potentially be hijacked by remote attackers.