CVE-2017-6758
moderate-risk
Published 2017-08-07
A vulnerability in the web framework of Cisco Unified Communications Manager 11.5(1.10000.6) could allow an authenticated, remote attacker to access arbitrary files in the context of the web root directory structure on an affected device. The vulnerability is due to insufficient input validation by the affected software. An attacker could exploit this vulnerability by using directory traversal techniques to read files in the web root directory structure on the Cisco Unified Communications Manager filesystem. Cisco Bug IDs: CSCve13796.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/100119
Third Party Advisory
http://www.securitytracker.com/id/1039064
Vendor Advisory
https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13796
Third Party Advisory
http://www.securityfocus.com/bid/100119
Third Party Advisory
http://www.securitytracker.com/id/1039064
Vendor Advisory
https://quickview.cloudapps.cisco.com/quickview/bug/CSCve13796
33
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
4/34 · Minimal
Exposure
5/34 · Minimal