Cisco Unified MeetingPlace XML Processing Information Disclosure Vulnerability

Cisco-SA-20150529-CVE-2015-0758 · Medium · Published · Updated

A vulnerability in the web-based user interface of Cisco Unified MeetingPlace could allow an authenticated, remote attacker to gain read access to select information stored on the affected system. The vulnerability is due to improper handling of XML External Entities (XXEs) when parsing an XML file. An attacker could exploit this vulnerability by convincing the administrator of an affected system to import a crafted XML file. A successful exploit could allow the attacker read access to sensitive information stored on an affected system, which could be used to conduct further attacks. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate to a targeted device in addition to convincing an administrator of the device to import a crafted XML file. These requirements could limit the possibility of a successful exploit.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0758
Cisco Bug IDsCSCus97452
CVSS ScoreBase 4.0
Base 4.0 AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C

Public Affected Products