First published: Wed May 03 2017(Updated: )
A vulnerability in the ImageID parameter of Cisco Unity Connection 10.5(2) could allow an unauthenticated, remote attacker to access files in arbitrary locations on the filesystem of an affected device. The issue is due to improper sanitization of user-supplied input in HTTP POST parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. Cisco Bug IDs: CSCvd90118.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unity Connection | =10.5\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6629 has been classified as a high-severity vulnerability due to its potential for unauthorized access to sensitive files.
To fix CVE-2017-6629, update Cisco Unity Connection to a version that includes the security fix for the vulnerability.
The impact of CVE-2017-6629 allows an attacker to access arbitrary files on the filesystem of an affected Cisco Unity Connection device.
CVE-2017-6629 affects users of Cisco Unity Connection version 10.5(2) and potentially earlier versions.
Yes, CVE-2017-6629 is exploitable remotely by unauthenticated attackers without needing physical access to the device.