Cisco Unified Interaction Manager Web Interface Security Bypass Vulnerability

Cisco-SA-20150813-CVE-2015-4299 · Medium · Published · Updated

A vulnerability in the Cisco Unified Interaction Manager web interface could allow an authenticated, remote attacker to delete default system folders for the messaging queues. The vulnerability is due insufficient validation of user-supplied data against the application authorization control logic. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate to the targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-4299
Cisco Bug IDsCSCuo89046
CVSS ScoreBase 4.0
Base 4.0 AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C

Public Affected Products