First published: Mon Aug 11 2014(Updated: )
The server in Cisco Unity Connection 9.1(1) and 9.1(2) allows remote authenticated users to obtain privileged access by conducting an "HTTP Intercept" attack and leveraging the ability to read files within the context of the web-server user account, aka Bug ID CSCup41014.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =9.1\(1\) | |
Cisco Unity Connection | =9.1\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3333 has been classified with a CVSS score indicating a high severity level due to the potential for privilege escalation.
To address CVE-2014-3333, it is recommended to upgrade to a non-vulnerable version of Cisco Unity Connection, specifically versions beyond 9.1(2).
Yes, CVE-2014-3333 can be exploited remotely by authenticated users through an HTTP intercept attack.
CVE-2014-3333 allows attackers to obtain privileged access and read files within the context of the web-server user account.
CVE-2014-3333 affects Cisco Unity Connection versions 9.1(1) and 9.1(2).