Cisco Unified Interaction Manager Web Interface Authorization Bypass Vulnerability

Cisco-SA-20150813-CVE-2015-4298 · Medium · Published · Updated

A vulnerability in the Cisco Unified Interaction Manager web interface could allow an authenticated, remote attacker to view, modify, and delete data without proper authorization. The vulnerability is due to insufficient validation of user-supplied data against the application authorization control logic. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate to the targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available. Cisco would like to thank Jakub Kaluzny of Securing.pl for reporting this vulnerability.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-4298
Cisco Bug IDsCSCuo89056
CVSS ScoreBase 5.5
Base 5.5 AV:N/AC:L/Au:S/C:P/I:P/A:N/E:F/RL:OF/RC:C

Public Affected Products