First published: Thu Jan 10 2019(Updated: )
A vulnerability in the web-based management interface of Cisco Unified Communications Manager could allow an authenticated, remote attacker to view digest credentials in clear text. The vulnerability is due to the incorrect inclusion of saved passwords in configuration pages. An attacker could exploit this vulnerability by logging in to the Cisco Unified Communications Manager web-based management interface and viewing the source code for the configuration page. A successful exploit could allow the attacker to recover passwords and expose those accounts to further attack.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =10.5\(2.14076.1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0474 has a medium severity level due to the potential exposure of sensitive credentials.
To fix CVE-2018-0474, apply the latest security patches released by Cisco for Cisco Unified Communications Manager 10.5.
CVE-2018-0474 affects Cisco Unified Communications Manager version 10.5(2.14076.1) as identified.
An attacker exploiting CVE-2018-0474 can view saved digest credentials in clear text, which can lead to unauthorized access.
Yes, CVE-2018-0474 specifically pertains to the web-based management interface of Cisco Unified Communications Manager.