First published: Wed May 03 2017(Updated: )
A vulnerability in the Cisco Finesse Notification Service for Cisco Unified Contact Center Enterprise (UCCE) 11.5(1) and 11.6(1) could allow an unauthenticated, remote attacker to retrieve information from agents using the Finesse Desktop. The vulnerability is due to the existence of a user account that has an undocumented, hard-coded password. An attacker could exploit this vulnerability by using the hard-coded credentials to subscribe to the Finesse Notification Service, which would allow the attacker to receive notifications when an agent signs in or out of the Finesse Desktop, when information about an agent changes, or when an agent's state changes. Cisco Bug IDs: CSCvc08314.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IP Contact Center Enterprise | =11.5\(1\) | |
Cisco IP Contact Center Enterprise | =11.6\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6626 has a high severity rating due to the potential for remote attackers to access sensitive agent information.
To fix CVE-2017-6626, upgrade your Cisco Finesse Notification Service to the latest patched version as recommended by Cisco.
CVE-2017-6626 affects Cisco Unified Contact Center Enterprise versions 11.5(1) and 11.6(1).
Yes, CVE-2017-6626 can be exploited by unauthenticated remote attackers to retrieve information from agents.
CVE-2017-6626 is caused by the existence of a user account that is improperly managed, allowing unauthorized data access.