First published: Thu May 29 2014(Updated: )
The Administration GUI in the web framework in VOSS in Cisco Unified Communications Domain Manager (CDM) 9.0(.1) and earlier does not properly implement access control, which allows remote authenticated users to obtain sensitive user and group information by leveraging Location Administrator privileges and entering a crafted URL, aka Bug ID CSCum77005.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Domain Manager | <=9.0\(.1\) | |
Cisco Unified Communications Domain Manager | =7.4 | |
Cisco Unified Communications Domain Manager | =8.6 | |
Cisco Unified Communications Domain Manager | =8.6\(.2\) | |
Cisco Unified Communications Domain Manager | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3277 is considered a medium severity vulnerability due to improper access control leading to exposure of sensitive information.
To mitigate CVE-2014-3277, upgrade to a patched version of Cisco Unified Communications Domain Manager that addresses the access control issues.
CVE-2014-3277 affects users of Cisco Unified Communications Domain Manager versions 7.4, 8.6, and 9.0 and earlier.
CVE-2014-3277 can lead to unauthorized access to sensitive user and group information within the system.
CVE-2014-3277 is a remote vulnerability that requires authentication to exploit.