First published: Thu Jun 07 2018(Updated: )
A vulnerability in the password reset function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password reset request. An attacker could exploit this vulnerability by submitting a password reset request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd07245.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Collaboration | <=12.1 | |
Cisco Prime Collaboration Provisioning | <=11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Prime Collaboration Provisioning (PCP) vulnerability is CVE-2018-0318.
The severity of CVE-2018-0318 is critical, with a CVSS score of 9.8.
The vulnerability is due to insufficient validation of a password reset request, allowing an unauthenticated, remote attacker to gain unauthorized access to the affected device.
Cisco Prime Collaboration versions up to and including 12.1, and Cisco Prime Collaboration Provisioning versions up to and including 11.6 are affected.
To fix CVE-2018-0318 in Cisco Prime Collaboration Provisioning, update to a version that is not affected by the vulnerability.