CWE
310
Advisory Published
Updated

CVE-2014-7991

First published: Fri Nov 14 2014(Updated: )

The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Unified Communications Manager<=10.0\(1\)
Cisco Unified Communications Manager=10.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2014-7991?

    CVE-2014-7991 has been assigned a high severity rating due to the potential for man-in-the-middle attacks.

  • How do I fix CVE-2014-7991?

    To mitigate CVE-2014-7991, upgrade to a version of Cisco Unified Communications Manager later than 10.0(1) that properly validates the Subject Alternative Name field.

  • What devices are affected by CVE-2014-7991?

    CVE-2014-7991 affects Cisco Unified Communications Manager versions 10.0(1) and earlier.

  • What impact does CVE-2014-7991 have on system security?

    CVE-2014-7991 allows attackers to exploit improper validation in X.509 certificates, potentially leading to unauthorized access and data interception.

  • Can CVE-2014-7991 be exploited remotely?

    Yes, CVE-2014-7991 can be exploited remotely by man-in-the-middle attackers using crafted certificates.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203