First published: Thu May 29 2014(Updated: )
The Administration GUI in the web framework in VOSS in Cisco Unified Communications Domain Manager (CDM) 9.0(.1) and earlier does not properly implement access control, which allows remote authenticated users to obtain sensitive number-translation information by leveraging Location Administrator privileges and entering a crafted URL, aka Bug ID CSCum76930.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Domain Manager | <=9.0\(.1\) | |
Cisco Unified Communications Domain Manager | =7.4 | |
Cisco Unified Communications Domain Manager | =8.6 | |
Cisco Unified Communications Domain Manager | =8.6\(.2\) | |
Cisco Unified Communications Domain Manager | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3282 has been classified as a medium severity vulnerability.
To address CVE-2014-3282, upgrade Cisco Unified Communications Domain Manager to a patched version released by Cisco.
CVE-2014-3282 allows remote authenticated users to access sensitive number-translation information.
CVE-2014-3282 affects Cisco Unified Communications Domain Manager versions 7.4, 8.6, and 9.0 up to 9.0(.1).
CVE-2014-3282 can be exploited by remote authenticated users with Location Administrator privileges.