cvelist/2014/7xxx/CVE-2014-7991.json

87 lines
3.0 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:07:42 +00:00
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2014-7991",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 03:07:42 +00:00
"lang": "eng",
"value": "The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376."
2017-10-16 12:31:07 -04:00
}
2019-03-18 03:07:42 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1031181",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1031181"
},
{
"name": "cisco-ucm-cve20147991-spoofing(98574)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98574"
},
{
"name": "62267",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62267"
},
{
"name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36381",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=36381"
},
{
"name": "71013",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/71013"
},
{
"name": "20141110 Cisco Unified Communications Manager Remote Mobile Access Subsystem Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991"
}
]
}
}