First published: Thu May 29 2014(Updated: )
The Administration GUI in the web framework in VOSS in Cisco Unified Communications Domain Manager (CDM) 9.0(.1) and earlier does not properly implement access control, which allows remote attackers to enumerate account names via a crafted URL, aka Bug IDs CSCun39631 and CSCun39643.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Domain Manager | <=9.0\(.1\) | |
Cisco Unified Communications Domain Manager | =7.4 | |
Cisco Unified Communications Domain Manager | =8.6 | |
Cisco Unified Communications Domain Manager | =8.6\(.2\) | |
Cisco Unified Communications Domain Manager | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3279 has been classified with a medium severity level due to improper access control allowing account name enumeration.
To fix CVE-2014-3279, update the affected Cisco Unified Communications Domain Manager to a version that implements proper access controls.
CVE-2014-3279 affects Cisco Unified Communications Domain Manager versions 9.0(.1), 8.6, and 7.4.
CVE-2014-3279 allows remote attackers to enumerate account names via a crafted URL.
Yes, Cisco has provided updates to fix the vulnerability in Cisco Unified Communications Domain Manager.