CVE-2009-0632
Published Mar 12, 2009
Last updated 7 years ago
Overview
- Description
- The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-255
Evaluator
- Comment
- -
- Impact
- Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml "Impact Successful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication."
- Solution
- Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml "Impact Successful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication."
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E29A61E-334B-4F95-9B47-8F53A4DB3EB0" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6C20851-DC17-4E89-A6C1-D1B52D47608F" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B9DCB59-F6AD-4CBD-B746-8FBA4BF733CC" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr2b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3E094AB-5F10-4238-BBE3-236B7306C995" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2496F01D-E387-48CD-B586-826D284BBC2E" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.2\\(3\\)sr4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5955E35-E200-4054-8757-39BD04F13220" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "577571D6-AC59-4A43-B9A5-7B6FC6D2046C" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(1\\)sr.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A459F3A2-817B-4F7F-AF9B-4EACB90B7DF2" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BB09252-6C59-4E1C-93C8-0AC3ED54A294" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:4.3\\(2\\)sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA0F270A-F953-43C7-9358-3B237B355BB4" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2AF68FA-433F-46F2-B309-B60A108BECFA" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B9FDFF3-2E60-4E41-9251-93283D945D94" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "239510AD-8BB0-4515-B1DA-80DE696D25DD" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26277C4A-4E27-492C-B18C-AC68D86ADF55" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(2b\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9003EC1A-6E85-41F1-BB5D-B841C9C28105" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0318CF61-B892-4D44-B41A-D630B4AB808C" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CDA8A78-BA6C-4451-8EAA-B83C3A6C6BA2" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3c\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84A49932-1E22-4BE0-8195-926D44F65AAA" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:5.1\\(3d\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DE1B0DD-EA64-493B-86B7-9057EE5033C8" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819AE879-5BF9-494E-8905-1E1E867EB5A9" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2DF1139-A161-48DD-9929-F6939D626461" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.0\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF99088E-1330-4E15-8BD3-2A5172FBA460" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BC6EF34-D23D-45CA-A907-A47993CC061E" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CC94003-72B6-45C3-A07E-0A08F1562B6A" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(1a\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "958A2707-0F1A-4719-BB9F-DC9ED129105A" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "597D9674-F44D-4A31-A2F2-2790ED698A91" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(2\\)su1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C2B7439-8547-41A6-AE6C-6ABCD167890E" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:6.1\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE122F76-ECDB-4446-825C-EF02257D8C08" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F2564A8-5805-46E0-B6EC-F4967D67C566" }, { "criteria": "cpe:2.3:a:cisco:unified_communications_manager:7.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0907FAF-8334-42C1-B35A-EC6ED89AC110" } ], "operator": "OR" } ] } ]