Cisco Unified Communications Manager IM and Presence Service 12.5(1)SU6

CPE Details

Cisco Unified Communications Manager IM and Presence Service 12.5(1)SU6
12.5\(1\)su6
2022-05-02
13h25 +00:00
2022-06-29
09h19 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cisco:unified_communications_manager_im_and_presence_service:12.5\(1\)su6:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

unified_communications_manager_im_and_presence_service

Version

12.5\(1\)su6

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-20253 2024-01-26 17h28 +00:00 A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to the improper processing of user-provided data that is being read into memory. An attacker could exploit this vulnerability by sending a crafted message to a listening port of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the web services user. With access to the underlying operating system, the attacker could also establish root access on the affected device.
10
Critique
CVE-2021-34701 2021-11-04 15h40 +00:00 A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an authenticated, remote attacker to access sensitive data on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the affected system.
4.3
Moyen