CVE-2008-3814
Published Oct 8, 2008
Last updated 7 years ago
Overview
- Description
- Unspecified vulnerability in Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to bypass authentication and read or modify system configuration parameters by going to a specific link more than once.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-287
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unity:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7069DF8-3006-4651-816A-855C980256FA" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDE9975D-17B0-4EC8-8278-A715F4BF14F4" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9555A7EC-C0B6-4F48-99BE-BCE51446CF47" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16F3E72C-FF4B-425E-A8FB-C1C4BEDDB019" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F05B00B2-F624-427C-9643-19B8E057193D" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A164F687-98DB-409D-A9C4-D04ECF6DD53F" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):sr1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "255CAB12-EE1D-4DC3-B854-E0D645F4C9B8" }, { "criteria": "cpe:2.3:a:cisco:unity:4.0\\(5\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A9BA9FD-99EC-4571-ACE8-2EFD13EFEBC5" }, { "criteria": "cpe:2.3:a:cisco:unity:4.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B746D68B-C6A4-494C-9302-F4652E1E2A13" }, { "criteria": "cpe:2.3:a:cisco:unity:4.2\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B478632-B2D4-443B-961A-0B3CF1A593CE" }, { "criteria": "cpe:2.3:a:cisco:unity:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20DAD5D8-6882-48FE-AE7A-9440F47F6C2A" }, { "criteria": "cpe:2.3:a:cisco:unity:5.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63260FD4-A010-4B2C-8654-4E18D5E8B364" }, { "criteria": "cpe:2.3:a:cisco:unity:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EED32D3-A1C5-430C-8488-4D221196CB76" }, { "criteria": "cpe:2.3:a:cisco:unity:7.0\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8268EB91-5DCC-4E0C-9537-07EF5CE1695C" } ], "operator": "OR" } ] } ]