First published: Thu Sep 05 2019(Updated: )
A vulnerability in Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system. The vulnerability is due to improper validation of user-supplied input on the affected system. An attacker could exploit this vulnerability by sending the user of the web application a crafted request. If the request is processed, the attacker could access the system and perform unauthorized actions.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Contact Center Express | <11.6\(2\)es04 | |
Cisco Unified Contact Center Express | =12.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12633 is a vulnerability in Cisco Unified Contact Center Express (Unified CCX) that could allow an unauthenticated, remote attacker to bypass access controls and conduct a server-side request forgery (SSRF) attack on a targeted system.
CVE-2019-12633 allows an attacker to bypass access controls and perform SSRF attacks on a Cisco Unified Contact Center Express system.
CVE-2019-12633 has a severity level of 7.5 (high).
CVE-2019-12633 affects Cisco Unified Contact Center Express versions 11.6(2)es04 and 12.0(1).
To fix CVE-2019-12633, it is recommended to apply the necessary updates or patches provided by Cisco.