ID

VAR-201708-1339


CVE

CVE-2017-6785


TITLE

Cisco Unified Communications Manager Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-007194

DESCRIPTION

A vulnerability in configuration modification permissions validation for Cisco Unified Communications Manager could allow an authenticated, remote attacker to perform a horizontal privilege escalation where one user can modify another user's configuration. The vulnerability is due to lack of proper Role Based Access Control (RBAC) when certain user configuration changes are requested. An attacker could exploit this vulnerability by sending an authenticated, crafted HTTP request to the targeted application. An exploit could allow the attacker to impact the integrity of the application where one user can modify the configuration of another user's information. Cisco Bug IDs: CSCve27331. Known Affected Releases: 10.5(2.10000.5), 11.0(1.10000.10), 11.5(1.10000.6). Cisco Unified Communications Manager Contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCve27331 It is released as.Information may be tampered with. Attackers can exploit this issue to gain elevated privileges and perform unauthorized actions. This component provides a scalable, distributed and highly available enterprise IP telephony call processing solution

Trust: 2.07

sources: NVD: CVE-2017-6785 // JVNDB: JVNDB-2017-007194 // BID: 100375 // VULHUB: VHN-114988 // VULMON: CVE-2017-6785

AFFECTED PRODUCTS

vendor:ciscomodel:unified communications managerscope:eqversion:11.0\(1.10000.10\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:10.5\(2.10000.5\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope:eqversion:11.5\(1.10000.6\)

Trust: 1.6

vendor:ciscomodel:unified communications managerscope: - version: -

Trust: 0.8

vendor:ciscomodel:unified communications managerscope:eqversion:11.5(1.10000.6)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:11.0(1.10000.10)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion:10.5(2.10000.5)

Trust: 0.3

vendor:ciscomodel:unified communications managerscope:eqversion: -

Trust: 0.3

sources: BID: 100375 // JVNDB: JVNDB-2017-007194 // CNNVD: CNNVD-201708-795 // NVD: CVE-2017-6785

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6785
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6785
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201708-795
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114988
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-6785
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6785
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-114988
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6785
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-114988 // VULMON: CVE-2017-6785 // JVNDB: JVNDB-2017-007194 // CNNVD: CNNVD-201708-795 // NVD: CVE-2017-6785

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-114988 // JVNDB: JVNDB-2017-007194 // NVD: CVE-2017-6785

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201708-795

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201708-795

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007194

PATCH

title:cisco-sa-20170816-ucmurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170816-ucm

Trust: 0.8

title:Cisco Unified Communications Manager Fixes for permission permissions and access control vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74112

Trust: 0.6

title:Cisco: Cisco Unified Communications Manager Horizontal Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20170816-ucm

Trust: 0.1

sources: VULMON: CVE-2017-6785 // JVNDB: JVNDB-2017-007194 // CNNVD: CNNVD-201708-795

EXTERNAL IDS

db:NVDid:CVE-2017-6785

Trust: 2.9

db:BIDid:100375

Trust: 1.5

db:SECTRACKid:1039184

Trust: 1.2

db:JVNDBid:JVNDB-2017-007194

Trust: 0.8

db:CNNVDid:CNNVD-201708-795

Trust: 0.7

db:NSFOCUSid:37455

Trust: 0.6

db:VULHUBid:VHN-114988

Trust: 0.1

db:VULMONid:CVE-2017-6785

Trust: 0.1

sources: VULHUB: VHN-114988 // VULMON: CVE-2017-6785 // BID: 100375 // JVNDB: JVNDB-2017-007194 // CNNVD: CNNVD-201708-795 // NVD: CVE-2017-6785

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170816-ucm

Trust: 2.2

url:http://www.securityfocus.com/bid/100375

Trust: 1.2

url:http://www.securitytracker.com/id/1039184

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6785

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6785

Trust: 0.8

url:http://www.nsfocus.net/vulndb/37455

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-114988 // VULMON: CVE-2017-6785 // BID: 100375 // JVNDB: JVNDB-2017-007194 // CNNVD: CNNVD-201708-795 // NVD: CVE-2017-6785

CREDITS

Cisco TAC Support case.

Trust: 0.3

sources: BID: 100375

SOURCES

db:VULHUBid:VHN-114988
db:VULMONid:CVE-2017-6785
db:BIDid:100375
db:JVNDBid:JVNDB-2017-007194
db:CNNVDid:CNNVD-201708-795
db:NVDid:CVE-2017-6785

LAST UPDATE DATE

2024-11-23T22:22:26.468000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-114988date:2017-08-24T00:00:00
db:VULMONid:CVE-2017-6785date:2017-08-24T00:00:00
db:BIDid:100375date:2017-08-16T00:00:00
db:JVNDBid:JVNDB-2017-007194date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201708-795date:2017-08-18T00:00:00
db:NVDid:CVE-2017-6785date:2024-11-21T03:30:31.527

SOURCES RELEASE DATE

db:VULHUBid:VHN-114988date:2017-08-17T00:00:00
db:VULMONid:CVE-2017-6785date:2017-08-17T00:00:00
db:BIDid:100375date:2017-08-16T00:00:00
db:JVNDBid:JVNDB-2017-007194date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201708-795date:2017-08-18T00:00:00
db:NVDid:CVE-2017-6785date:2017-08-17T20:29:00.853