First published: Mon Aug 07 2017(Updated: )
A vulnerability in the web framework of Cisco Unified Communications Manager 11.5(1.10000.6) could allow an authenticated, remote attacker to access arbitrary files in the context of the web root directory structure on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques to read files in the web root directory structure on the Cisco Unified Communications Manager filesystem. Cisco Bug IDs: CSCve13796.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =11.5\(1.10000.6\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6758 has been assigned a high severity rating due to the potential for authenticated remote attackers to access sensitive files.
To fix CVE-2017-6758, it is recommended to upgrade Cisco Unified Communications Manager to a version where this vulnerability is addressed.
The impact of CVE-2017-6758 allows attackers to retrieve arbitrary files from the web root directory, which could expose sensitive information.
No, CVE-2017-6758 requires an attacker to be authenticated to exploit the vulnerability.
CVE-2017-6758 specifically affects Cisco Unified Communications Manager version 11.5(1.10000.6).