ID

VAR-201512-0382


CVE

CVE-2015-6406


TITLE

Cisco Emergency Responder of Tools Directory traversal vulnerability in menu

Trust: 0.8

sources: JVNDB: JVNDB-2015-006385

DESCRIPTION

Directory traversal vulnerability in the Tools menu in Cisco Emergency Responder 10.5(1.10000.5) allows remote authenticated users to write to arbitrary files via a crafted filename, aka Bug ID CSCuv21781. The Cisco Emergency Responder real-time location address tracking database and enhanced routing capabilities allow emergency calls to be directly transferred to the appropriate Public Safety Answering Point (PASP) based on the caller's location. A remote attacker could exploit the vulnerability to place files anywhere on the affected device. Exploiting this issue can allow an attacker to gain read access to arbitrary files. Information harvested may aid in launching further attacks. This issue is being tracked by Cisco Bug ID CSCuv21781. The software provides features such as real-time location tracking database and caller's location

Trust: 2.52

sources: NVD: CVE-2015-6406 // JVNDB: JVNDB-2015-006385 // CNVD: CNVD-2015-08367 // BID: 78816 // VULHUB: VHN-84367

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-08367

AFFECTED PRODUCTS

vendor:ciscomodel:emergency responderscope:eqversion:10.5\(1.10000.5\)

Trust: 1.6

vendor:ciscomodel:emergency responder softwarescope:eqversion:10.5(1.10000.5)

Trust: 0.8

vendor:ciscomodel:emergency responderscope:eqversion:10.5(1.10000.5)

Trust: 0.6

sources: CNVD: CNVD-2015-08367 // JVNDB: JVNDB-2015-006385 // CNNVD: CNNVD-201512-289 // NVD: CVE-2015-6406

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6406
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6406
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-08367
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-289
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84367
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6406
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-08367
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84367
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-08367 // VULHUB: VHN-84367 // JVNDB: JVNDB-2015-006385 // CNNVD: CNNVD-201512-289 // NVD: CVE-2015-6406

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-84367 // JVNDB: JVNDB-2015-006385 // NVD: CVE-2015-6406

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-289

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201512-289

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006385

PATCH

title:cisco-sa-20151209-erturl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-ert

Trust: 0.8

title:Cisco Emergency Responder Tools Menu Fixes for directory traversal vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59129

Trust: 0.6

sources: JVNDB: JVNDB-2015-006385 // CNNVD: CNNVD-201512-289

EXTERNAL IDS

db:NVDid:CVE-2015-6406

Trust: 3.4

db:BIDid:78816

Trust: 2.0

db:SECTRACKid:1034384

Trust: 1.1

db:JVNDBid:JVNDB-2015-006385

Trust: 0.8

db:CNNVDid:CNNVD-201512-289

Trust: 0.7

db:CNVDid:CNVD-2015-08367

Trust: 0.6

db:VULHUBid:VHN-84367

Trust: 0.1

sources: CNVD: CNVD-2015-08367 // VULHUB: VHN-84367 // BID: 78816 // JVNDB: JVNDB-2015-006385 // CNNVD: CNNVD-201512-289 // NVD: CVE-2015-6406

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151209-ert

Trust: 2.3

url:http://www.securityfocus.com/bid/78816

Trust: 1.7

url:http://www.securitytracker.com/id/1034384

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6406

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6406

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-08367 // VULHUB: VHN-84367 // BID: 78816 // JVNDB: JVNDB-2015-006385 // CNNVD: CNNVD-201512-289 // NVD: CVE-2015-6406

CREDITS

Cisco

Trust: 0.9

sources: BID: 78816 // CNNVD: CNNVD-201512-289

SOURCES

db:CNVDid:CNVD-2015-08367
db:VULHUBid:VHN-84367
db:BIDid:78816
db:JVNDBid:JVNDB-2015-006385
db:CNNVDid:CNNVD-201512-289
db:NVDid:CVE-2015-6406

LAST UPDATE DATE

2024-11-23T22:27:04.143000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-08367date:2015-12-22T00:00:00
db:VULHUBid:VHN-84367date:2016-12-07T00:00:00
db:BIDid:78816date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006385date:2015-12-16T00:00:00
db:CNNVDid:CNNVD-201512-289date:2015-12-14T00:00:00
db:NVDid:CVE-2015-6406date:2024-11-21T02:34:56.413

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-08367date:2015-12-22T00:00:00
db:VULHUBid:VHN-84367date:2015-12-13T00:00:00
db:BIDid:78816date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006385date:2015-12-16T00:00:00
db:CNNVDid:CNNVD-201512-289date:2015-12-11T00:00:00
db:NVDid:CVE-2015-6406date:2015-12-13T03:59:05.147