First published: Wed Apr 02 2014(Updated: )
Cross-site scripting (XSS) vulnerability in the Web Inbox in Cisco Unity Connection 8.6(2a)SU3 and earlier allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka Bug ID CSCui33028.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | <=8.6 | |
Cisco Unity Connection | =8.6 | |
Cisco Unity Connection | =8.6-\(1\) | |
Cisco Unity Connection | =8.6-\(2\) | |
Cisco Unity Connection | =8.6-\(2a\)su1 | |
Cisco Unity Connection | =8.6-\(2a\)su2 | |
Cisco Unity Connection | =8.6\(1a\) | |
Cisco Unity Connection | =8.6\(2a\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2125 has a medium severity rating due to its potential for cross-site scripting attacks that can affect user sessions.
To resolve CVE-2014-2125, upgrade your Cisco Unity Connection software to a version later than 8.6(2a)SU3.
CVE-2014-2125 affects Cisco Unity Connection versions 8.6(2a)SU3 and earlier.
CVE-2014-2125 is a cross-site scripting (XSS) vulnerability that allows remote attackers to inject web scripts or HTML.
Yes, CVE-2014-2125 can be exploited remotely by attackers to inject harmful scripts.