First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web-based interface of Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to access sensitive information or cause a denial of service (DoS) condition. The vulnerability is due to improper restrictions on XML entities. An attacker could exploit this vulnerability by sending malicious requests to an affected system that contain references in XML entities. A successful exploit could allow the attacker to retrieve files from the local system, resulting in the disclosure of sensitive information, or cause the application to consume available resources, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Communications Manager | =10.5\(2.10000.5\) | |
Cisco Unified Communications Manager | =11.5\(1.10000.6\) | |
Cisco Unified Communications Manager | =12.0\(1.10000.10\) | |
Cisco Unified Communications Manager | =12.5\(1.10000.22\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12711 is a vulnerability in Cisco Unified Communications Manager and Cisco Unified Communications Manager Session Management Edition (SME) that could allow an unauthenticated, remote attacker to access sensitive information or cause a denial of service (DoS) condition.
The severity of CVE-2019-12711 is medium, with a CVSS score of 6.5.
CVE-2019-12711 affects Cisco Unified Communications Manager versions 10.5(2.10000.5), 11.5(1.10000.6), 12.0(1.10000.10), and 12.5(1.10000.22).
An attacker can exploit CVE-2019-12711 by sending malicious requests to the web-based interface of Cisco Unified Communications Manager or Cisco Unified Communications Manager SME.
Yes, Cisco has released a software update to address this vulnerability. Please refer to the Cisco Security Advisory for more information.