René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

175 lines
6.6 KiB
JSON

{
"id": "CVE-2014-0733",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2014-02-20T15:27:09.437",
"lastModified": "2014-02-20T23:52:25.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Enterprise License Manager (ELM) component in Cisco Unified Communications Manager (Unified CM) 10.0(1) and earlier does not properly enforce authentication requirements, which allows remote attackers to read ELM files via a direct request to a URL, aka Bug ID CSCum46494."
},
{
"lang": "es",
"value": "El componente Enterprise License Manager (ELM) en Cisco Unified Communications Manager (Unified CM) 10.0(1) y anteriores no fuerza debidamente los requisitos de autenticaci\u00f3n, lo que permite a atacantes remotos leer archivos ELM a trav\u00e9s de una solicitud directa hacia una URL, tambi\u00e9n conocido como Bug ID CSCum46494."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "10.0\\(1\\)",
"matchCriteriaId": "0F66EDBF-F735-4E44-B650-39FCE806535A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B9DA1F8-FA05-4380-8EFF-AF9FEF18FF2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "65BB9155-89E5-4D54-AF1B-D5CA38392D5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:3.3\\(5\\)sr2a:*:*:*:*:*:*:*",
"matchCriteriaId": "2A76CD6B-0C24-4F5F-B4BB-BA114150A7F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F9BD08CD-9169-4B1E-A6DE-B138E6AB533C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFD96E3-B19F-41B7-86FD-DBFD41382C28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "0E9BF838-87A2-43B8-975B-524D7F954BF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr3:*:*:*:*:*:*:*",
"matchCriteriaId": "9600EA23-5428-4312-A38E-480E3C3228BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1\\(3\\)sr4:*:*:*:*:*:*:*",
"matchCriteriaId": "57F5547E-F9C8-4F9C-96A1-563A66EE8D48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BC830649-C0D4-4FFC-8701-80FB4A706F58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "935D2815-7146-4125-BDBE-BFAA62A88EC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF54827-75E6-4BA0-84F0-0EC0E24A4A73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr1:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8628E7-D3C8-4212-B0A5-6B5AC14D6101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2:*:*:*:*:*:*:*",
"matchCriteriaId": "19432E5E-EA68-4B7A-8B99-DEBACBC3F160"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2.3sr2b:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE4CD8E-F27C-4F96-B955-FC1E71B5D55B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:unified_communications_manager:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "725D3E7D-6EF9-4C13-8B30-39ED49BBC8E3"
}
]
}
]
}
],
"references": [
{
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-0733",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=32914",
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}