{ "id": "CVE-2018-0119", "sourceIdentifier": "psirt@cisco.com", "published": "2018-02-08T07:29:00.367", "lastModified": "2024-11-21T03:37:33.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in certain authentication controls in the account services of Cisco Spark could allow an authenticated, remote attacker to interact with and view information on an affected device that would normally be prohibited. The vulnerability is due to the improper display of user-account tokens generated in the system. An attacker could exploit this vulnerability by logging in to the device with a token in use by another account. Successful exploitation could allow the attacker to cause a partial impact to the device's confidentiality, integrity, and availability. Cisco Bug IDs: CSCvg05206." }, { "lang": "es", "value": "Una vulnerabilidad en ciertos controles de autenticaci\u00f3n en los servicios de cuenta de Cisco Spark podr\u00eda permitir que un atacante remoto autenticado interact\u00fae y vea informaci\u00f3n en un dispositivo afectado que normalmente estar\u00eda prohibida. La vulnerabilidad se debe a que se muestran de forma indebida tokens de cuenta de usuario generados en el sistema. Un atacante podr\u00eda explotar esta vulnerabilidad iniciando sesi\u00f3n en el dispositivo con un token que est\u00e9 empleando otra cuenta. La explotaci\u00f3n con \u00e9xito podr\u00eda permitir que el atacante provoque un impacto parcial en la confidencialidad, integridad y disponibilidad del dispositivo. Cisco Bug IDs: CSCvg05206." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "baseScore": 4.7, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 1.2, "impactScore": 3.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "psirt@cisco.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:conference_director:2017-08-30:*:*:*:*:*:*:*", "matchCriteriaId": "C60C98F2-D7EA-4BF2-952A-F2B3D1A0BD18" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/102961", "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-spark", "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/102961", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180207-spark", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }