First published: Wed Aug 01 2018(Updated: )
A vulnerability in the password change function of Cisco Prime Collaboration Provisioning could allow an authenticated, remote attacker to cause the system to become inoperable. The vulnerability is due to insufficient validation of a password change request. An attacker could exploit this vulnerability by changing a specific administrator account password. A successful exploit could allow the attacker to cause the affected device to become inoperable, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 12.2 and prior. Cisco Bug IDs: CSCvd86586.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Prime Collaboration | =12.1 | |
Cisco Prime Collaboration Provisioning | <=12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Prime Collaboration Provisioning vulnerability is CVE-2018-0391.
The severity rating of CVE-2018-0391 is medium.
An attacker can exploit this vulnerability by sending a malicious password change request.
The affected software for CVE-2018-0391 is Cisco Prime Collaboration Provisioning version 12.1 and up to version 12.2.
Yes, here are the references available for CVE-2018-0391: [1] [2] [3]