First published: Sun Jan 26 2020(Updated: )
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to bypass authorization and access sensitive information related to the device. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | =11.6\(1\) | |
Cisco Finesse | =12.0\(1\) | |
Cisco Finesse | =12.5\(1\) | |
Cisco Unified Contact Center Express | =12.0\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15278 is a vulnerability in the web-based management interface of Cisco Finesse.
CVE-2019-15278 allows an unauthenticated, remote attacker to bypass authorization and access sensitive information.
CVE-2019-15278 has a severity rating of medium.
To fix CVE-2019-15278, apply the necessary updates or patches provided by Cisco.
You can find more information about CVE-2019-15278 on the Cisco Security Advisory page.