First published: Sat Apr 05 2014(Updated: )
Directory traversal vulnerability in the messaging API in Cisco Unity Connection allows remote authenticated users to read arbitrary files via vectors related to unenforced access constraints for .wav files and the audio/x-wav MIME type, aka Bug ID CSCun91071.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection 8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2145 is rated as a medium severity vulnerability.
CVE-2014-2145 exploits the messaging API by allowing remote authenticated users to read arbitrary files due to insufficient access control enforcement.
CVE-2014-2145 allows unauthorized access to .wav files and any files that are accessible through the audio/x-wav MIME type.
Organizations using Cisco Unity Connection are affected by CVE-2014-2145 if they have remote authenticated users.
To mitigate the risk of CVE-2014-2145, it's essential to apply the recommended security patches provided by Cisco.