First published: Wed Jun 05 2024(Updated: )
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Finesse | <11.6\(1\) | |
Cisco Finesse | =11.6\(1\) | |
Cisco Finesse | =11.6\(1\)-es4 | |
Cisco Finesse | =11.6\(1\)-es5 | |
Cisco Finesse | =11.6\(1\)-es6 | |
Cisco Finesse | =11.6\(1\)-es7 | |
Cisco Finesse | =11.6\(1\)-es8 | |
Cisco Finesse | =12.6\(2\) | |
Cisco Finesse | =12.6\(2\)-es01 | |
Cisco Finesse | =12.6\(2\)-es02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.