Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Transport Gateway for Smart Call Home Unauthorized Configuration Change Vulnerability

Cisco-SA-20140828-CVE-2014-3345 · Medium · Published · Updated

A vulnerability in the web framework code of Cisco Transport Gateway for Smart Call Home (TG-SCH) could allow an unauthenticated, remote attacker to make certain changes to the system. The vulnerability is due to improper implementation of authorization controls when accessing certain administrative web pages of the application. An attacker could exploit this vulnerability by submitting a crafted URL to the affected system. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-3345
Cisco Bug IDsCSCuq31503
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:U/RC:C
Product Names From Source
Cisco Transport Gateway Installation Software, Transport Gateway Installation Software

Related Products

Product CVE Evidence
Transport Gateway Installation Software CVE-2014-3345 Cisco OpenVuln
Cisco Transport Gateway Installation Software CVE-2014-3345 Cisco OpenVuln