Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-3177


A vulnerability in the Tool for Auto-Registered Phones Support (TAPS) of Cisco Unified Communications Manager (UCM) and Cisco Unified Communications Manager Session Management Edition (SME) could allow an unauthenticated, remote attacker to conduct directory traversal attacks on an affected device. The vulnerability is due to insufficient validation of user-supplied input to the TAPS interface of the affected device. An attacker could exploit this vulnerability by sending a crafted request to the TAPS interface. A successful exploit could allow the attacker to read arbitrary files in the system.


Published

2020-04-15T21:15:35.263

Last Modified

2024-11-21T05:30:29.297

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-22
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco unified_communications_manager 10.5\(2.10000.5\) Yes
Application cisco unified_communications_manager 11.5\(1.10000.6\) Yes
Application cisco unified_communications_manager 12.0\(1.10000.10\) Yes
Application cisco unified_communications_manager 12.5\(1.10000.22\) Yes
Application cisco unified_contact_center_express 12.0\(1\) Yes

References