ID

VAR-201512-0383


CVE

CVE-2015-6407


TITLE

Cisco Emergency Responder Vulnerable to uploading files to arbitrary locations

Trust: 0.8

sources: JVNDB: JVNDB-2015-006386

DESCRIPTION

Cisco Emergency Responder 10.5(3.10000.9) allows remote attackers to upload files to arbitrary locations via a crafted parameter, aka Bug ID CSCuv25501. The Cisco Emergency Responder real-time location address tracking database and enhanced routing capabilities allow emergency calls to be directly transferred to the appropriate Public Safety Answering Point (PASP) based on the caller's location. This may aid in further attacks. This issue is tracked by Cisco Bug ID CSCuv25501. Cisco Emergency Responder (ER) is an emergency call software in an IP communication system of Cisco (Cisco). The software provides features such as real-time location tracking database and caller's location. A security vulnerability exists in Cisco ER 10.5 (3.10000.9) release

Trust: 2.52

sources: NVD: CVE-2015-6407 // JVNDB: JVNDB-2015-006386 // CNVD: CNVD-2015-08368 // BID: 78817 // VULHUB: VHN-84368

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-08368

AFFECTED PRODUCTS

vendor:ciscomodel:emergency responderscope:eqversion:10.5\(3.10000.9\)

Trust: 1.6

vendor:ciscomodel:emergency responder softwarescope:eqversion:10.5(3.10000.9)

Trust: 0.8

vendor:ciscomodel:emergency responderscope:eqversion:10.5(3.10000.9)

Trust: 0.6

sources: CNVD: CNVD-2015-08368 // JVNDB: JVNDB-2015-006386 // CNNVD: CNNVD-201512-288 // NVD: CVE-2015-6407

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6407
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6407
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2015-08368
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201512-288
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84368
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6407
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-08368
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-84368
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-08368 // VULHUB: VHN-84368 // JVNDB: JVNDB-2015-006386 // CNNVD: CNNVD-201512-288 // NVD: CVE-2015-6407

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-84368 // JVNDB: JVNDB-2015-006386 // NVD: CVE-2015-6407

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201512-288

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201512-288

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-006386

PATCH

title:cisco-sa-20151209-erwurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151209-erw

Trust: 0.8

title:Cisco Emergency Responder Fixes for any file upload vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59128

Trust: 0.6

sources: JVNDB: JVNDB-2015-006386 // CNNVD: CNNVD-201512-288

EXTERNAL IDS

db:NVDid:CVE-2015-6407

Trust: 3.4

db:BIDid:78817

Trust: 2.0

db:SECTRACKid:1034383

Trust: 1.1

db:JVNDBid:JVNDB-2015-006386

Trust: 0.8

db:CNNVDid:CNNVD-201512-288

Trust: 0.7

db:CNVDid:CNVD-2015-08368

Trust: 0.6

db:VULHUBid:VHN-84368

Trust: 0.1

sources: CNVD: CNVD-2015-08368 // VULHUB: VHN-84368 // BID: 78817 // JVNDB: JVNDB-2015-006386 // CNNVD: CNNVD-201512-288 // NVD: CVE-2015-6407

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151209-erw

Trust: 2.3

url:http://www.securityfocus.com/bid/78817

Trust: 1.7

url:http://www.securitytracker.com/id/1034383

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6407

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6407

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-08368 // VULHUB: VHN-84368 // BID: 78817 // JVNDB: JVNDB-2015-006386 // CNNVD: CNNVD-201512-288 // NVD: CVE-2015-6407

CREDITS

Cisco

Trust: 0.9

sources: BID: 78817 // CNNVD: CNNVD-201512-288

SOURCES

db:CNVDid:CNVD-2015-08368
db:VULHUBid:VHN-84368
db:BIDid:78817
db:JVNDBid:JVNDB-2015-006386
db:CNNVDid:CNNVD-201512-288
db:NVDid:CVE-2015-6407

LAST UPDATE DATE

2024-11-23T22:07:53.497000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-08368date:2015-12-22T00:00:00
db:VULHUBid:VHN-84368date:2016-12-07T00:00:00
db:BIDid:78817date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006386date:2015-12-16T00:00:00
db:CNNVDid:CNNVD-201512-288date:2015-12-14T00:00:00
db:NVDid:CVE-2015-6407date:2024-11-21T02:34:56.520

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-08368date:2015-12-22T00:00:00
db:VULHUBid:VHN-84368date:2015-12-13T00:00:00
db:BIDid:78817date:2015-12-10T00:00:00
db:JVNDBid:JVNDB-2015-006386date:2015-12-16T00:00:00
db:CNNVDid:CNNVD-201512-288date:2015-12-11T00:00:00
db:NVDid:CVE-2015-6407date:2015-12-13T03:59:06.367