First published: Thu Jun 07 2018(Updated: )
A vulnerability in the password recovery function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password recovery request. An attacker could exploit this vulnerability by submitting a password recovery request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd07253.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Collaboration | <=12.1 | |
Cisco Prime Collaboration Provisioning | <=11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-0319.
CVE-2018-0319 has a severity rating of critical with a score of 9.8 out of 10.
The affected software for CVE-2018-0319 is Cisco Prime Collaboration and Cisco Prime Collaboration Provisioning.
An attacker can exploit CVE-2018-0319 by submitting a malicious password recovery request to gain unauthorized access to an affected device.
Yes, there are references available at the following links: [link1](http://www.securityfocus.com/bid/104431), [link2](http://www.securitytracker.com/id/1041079), [link3](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-prime-password-recovery)