First published: Fri Feb 15 2013(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the server in Cisco Unified MeetingPlace before 7.1(2.2000) allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, aka Bug ID CSCuc64903. NOTE: some of these details are obtained from third party information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified MeetingPlace | <=7.1 | |
Cisco Unified MeetingPlace | =5.4 | |
Cisco Unified MeetingPlace | =6.0 | |
Cisco Unified MeetingPlace | =6.1 | |
Cisco Unified MeetingPlace | =7.0 | |
Cisco Unified MeetingPlace | =7.0.1 | |
Cisco Unified MeetingPlace | =7.0.2 | |
Cisco Unified MeetingPlace | =7.0.2-mr1 | |
Cisco Unified MeetingPlace | =7.0.3 | |
Cisco Unified MeetingPlace | =7.0.3-mr2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1128 is classified as a high severity vulnerability due to its potential for cross-site request forgery attacks.
To mitigate CVE-2013-1128, it is recommended to upgrade to Cisco Unified MeetingPlace version 7.1(2.2000) or later.
CVE-2013-1128 affects multiple versions of Cisco Unified MeetingPlace, including versions 5.4 through 7.1.
Yes, CVE-2013-1128 can allow remote attackers to hijack the authentication of users, potentially leading to unauthorized access.
If you suspect exploitation of CVE-2013-1128, you should immediately assess your systems for signs of compromise and apply the necessary updates.