FKIE_CVE-2008-3814

Vulnerability from fkie_nvd - Published: 2008-10-08 22:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to bypass authentication and read or modify system configuration parameters by going to a specific link more than once.
References
psirt@cisco.comhttp://secunia.com/advisories/32187Vendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_advisory09186a0080a0d85f.shtmlPatch, Vendor Advisory
psirt@cisco.comhttp://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.htmlPatch, Vendor Advisory
psirt@cisco.comhttp://www.securityfocus.com/bid/31638
psirt@cisco.comhttp://www.securityfocus.com/bid/31642
psirt@cisco.comhttp://www.securitytracker.com/id?1021011
psirt@cisco.comhttp://www.voipshield.com/research-details.php?id=126
psirt@cisco.comhttp://www.vupen.com/english/advisories/2008/2771Vendor Advisory
psirt@cisco.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/45741
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32187Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0d85f.shtmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31638
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31642
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021011
af854a3a-2127-422b-91ae-364da2661108http://www.voipshield.com/research-details.php?id=126
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2771Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45741
Impacted products
Vendor Product Version
cisco unity 4.0
cisco unity 4.0\(1\)
cisco unity 4.0\(2\)
cisco unity 4.0\(3\)
cisco unity 4.0\(3\)
cisco unity 4.0\(4\)
cisco unity 4.0\(4\)
cisco unity 4.0\(5\)
cisco unity 4.1\(1\)
cisco unity 4.2\(1\)
cisco unity 5.0
cisco unity 5.0\(1\)
cisco unity 7.0
cisco unity 7.0\(2\)

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7069DF8-3006-4651-816A-855C980256FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "CDE9975D-17B0-4EC8-8278-A715F4BF14F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "9555A7EC-C0B6-4F48-99BE-BCE51446CF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "16F3E72C-FF4B-425E-A8FB-C1C4BEDDB019",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(3\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "F05B00B2-F624-427C-9643-19B8E057193D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "A164F687-98DB-409D-A9C4-D04ECF6DD53F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(4\\):sr1:*:*:*:*:*:*",
              "matchCriteriaId": "255CAB12-EE1D-4DC3-B854-E0D645F4C9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.0\\(5\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9BA9FD-99EC-4571-ACE8-2EFD13EFEBC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.1\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B746D68B-C6A4-494C-9302-F4652E1E2A13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:4.2\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5B478632-B2D4-443B-961A-0B3CF1A593CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20DAD5D8-6882-48FE-AE7A-9440F47F6C2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:5.0\\(1\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "63260FD4-A010-4B2C-8654-4E18D5E8B364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EED32D3-A1C5-430C-8488-4D221196CB76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:unity:7.0\\(2\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "8268EB91-5DCC-4E0C-9537-07EF5CE1695C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to bypass authentication and read or modify system configuration parameters by going to a specific link more than once."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en Unity de Cisco versiones 4.x anteriores a 4.2 (1) ES161, versiones 5.x anteriores a 5.0 (1) ES53 y versiones 7.x anteriores 7.0 (2) ES8, cuando utiliza autenticaci\u00f3n an\u00f3nima (tambi\u00e9n conocida como autenticaci\u00f3n Unity nativa), permite a los atacantes remotos omitir la autenticaci\u00f3n y leer o modificar los par\u00e1metros de configuraci\u00f3n del sistema yendo hacia un enlace espec\u00edfico m\u00e1s de una vez."
    }
  ],
  "id": "CVE-2008-3814",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-08T22:00:01.730",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32187"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0d85f.shtml"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/31638"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securityfocus.com/bid/31642"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.securitytracker.com/id?1021011"
    },
    {
      "source": "psirt@cisco.com",
      "url": "http://www.voipshield.com/research-details.php?id=126"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2771"
    },
    {
      "source": "psirt@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45741"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a0d85f.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31638"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.voipshield.com/research-details.php?id=126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45741"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…