Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-0474 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Unified Communications Manager (CallManager) Server applications / Remote management servers, RDP, SSH |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU16931
Risk: Low
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2018-0474
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists in the web-based management interface due to the incorrect inclusion of saved passwords in configuration pages. A remote attacker can log in to the Cisco Unified Communications Manager web-based management interface and view the source code for the configuration page to recover passwords and expose those accounts to further attack.
MitigationThe vulnerability has been fixed in the versions 12.0(1.10000.10), 12.0(0.98000.692), 12.0(0.98000.535), 12.0(0.98000.240), 12.0(0.98000.239).
Vulnerable software versionsUnified Communications Manager (CallManager): 10.5.2.14076.1
External linksQ & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.