
5/10/2016

6/8/2024
CVE-2016-6426: Input Validation
First published: Wed Oct 05 2016(Updated: )
The j_spring_security_switch_user function in Cisco Unified Intelligence Center (CUIC) 8.5.4 through 9.1(1), as used in Unified Contact Center Express 10.0(1) through 11.0(1), allows remote attackers to create user accounts by visiting an unspecified web page, aka Bug IDs CSCuy75027 and CSCuy81653.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|
Cisco Unified Contact Center Express Enhanced | =10.0\(1\) | |
Cisco Unified Contact Center Express Enhanced | =10.5\(1\) | |
Cisco Unified Contact Center Express Enhanced | =10.6\(1\) | |
Cisco Unified Contact Center Express Enhanced | =11.0\(1\) | |
Cisco Unified Intelligence Center | =8.5.4 | |
Cisco Unified Intelligence Center | =9.0\(2\) | |
Cisco Unified Intelligence Center | =9.1\(1\) | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2016-6426?
CVE-2016-6426 is considered a high severity vulnerability due to its potential for unauthorized account creation.
Which versions are affected by CVE-2016-6426?
CVE-2016-6426 affects Cisco Unified Intelligence Center versions 8.5.4 to 9.1(1) and Unified Contact Center Express versions 10.0(1) to 11.0(1).
How do I fix CVE-2016-6426?
To fix CVE-2016-6426, update affected Cisco software to the latest version that addresses this vulnerability.
Can CVE-2016-6426 be exploited remotely?
Yes, CVE-2016-6426 can be exploited remotely by attackers to create unauthorized user accounts.
What is the impact of exploiting CVE-2016-6426?
Exploitation of CVE-2016-6426 can lead to unauthorized access and potential abuse of user accounts within the affected Cisco systems.
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/last-modified-date
- agent/references
- agent/severity
- agent/weakness
- agent/event
- agent/first-publish-date
- agent/description
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/cisco
- canonical/cisco unified contact center express enhanced
- version/cisco unified contact center express enhanced/10.0\(1\)
- version/cisco unified contact center express enhanced/10.5\(1\)
- version/cisco unified contact center express enhanced/10.6\(1\)
- version/cisco unified contact center express enhanced/11.0\(1\)
- canonical/cisco unified intelligence center
- version/cisco unified intelligence center/8.5.4
- version/cisco unified intelligence center/9.0\(2\)
- version/cisco unified intelligence center/9.1\(1\)
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203