CVE-2017-6621
Published May 18, 2017
Last updated 7 years ago
Overview
- Description
- A vulnerability in the web interface of Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to access sensitive data. The attacker could use this information to conduct additional reconnaissance attacks. The vulnerability is due to insufficient protection of sensitive data when responding to an HTTP request on the web interface. An attacker could exploit the vulnerability by sending a crafted HTTP request to the application to access specific system files. An exploit could allow the attacker to obtain sensitive information about the application which could include user credentials. This vulnerability affects Cisco Prime Collaboration Provisioning Software Releases 10.6 through 11.5. Cisco Bug IDs: CSCvc99626.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:9.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23FBBA67-3E61-4C29-AE29-DA9AC85B130E" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:9.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ADD5C349-0CCD-4182-8B41-CB199868A318" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:10.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8B93578-B8CF-4977-B2D6-3F2420391008" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:10.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08D10D0F-159A-4C2A-9ECE-4C55ADE37298" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:10.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D2B13F1-A983-446D-8698-B562801B320B" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:10.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00D29AB4-BF27-4366-9CC1-060B8C97067A" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:10.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF0F423A-8552-4406-8E42-3C417AEB4A0B" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:11.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F05F7FBB-870A-4978-9F6F-E896472E53AA" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:11.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DF611EA-218D-4231-A7AA-1F795132F90E" }, { "criteria": "cpe:2.3:a:cisco:prime_collaboration_provisioning:11.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31DC57C2-8870-4663-830F-C6209F47DF06" } ], "operator": "OR" } ] } ]