First published: Fri Jul 24 2015(Updated: )
The password-change feature in Cisco Unified MeetingPlace Web Conferencing before 8.5(5) MR3 and 8.6 before 8.6(2) does not check the session ID or require entry of the current password, which allows remote attackers to reset arbitrary passwords via a crafted HTTP request, aka Bug ID CSCuu51839.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified MeetingPlace Web Conferencing | =6.0.417.0 | |
Cisco Unified MeetingPlace Web Conferencing | =6.0_base | |
Cisco Unified MeetingPlace Web Conferencing | =7.0\(1\) | |
Cisco Unified MeetingPlace Web Conferencing | =7.0\(2\) | |
Cisco Unified MeetingPlace Web Conferencing | =7.0\(2\)_sr1 | |
Cisco Unified MeetingPlace Web Conferencing | =7.0\(3\) | |
Cisco Unified MeetingPlace Web Conferencing | =7.1\(1\) | |
Cisco Unified MeetingPlace Web Conferencing | =7.1\(2\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.0\(1\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.0\(1\)_sr1 | |
Cisco Unified MeetingPlace Web Conferencing | =8.0\(2\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(1\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(2\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(2\)_sr1 | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(2\)_sr2 | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(3\) | |
Cisco Unified MeetingPlace Web Conferencing | =8.5\(4\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.