CVE-2019-1837
18.04.2019, 02:29
A vulnerability in the User Data Services (UDS) API of Cisco Unified Communications Manager (Unified CM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the management GUI. The vulnerability is due to improper validation of input parameters in the UDS API requests. An attacker could exploit this vulnerability by sending a crafted request to the UDS API of an affected device. A successful exploit could allow the attacker to make the A Cisco DB service quit unexpectedly, preventing admin access to the Unified CM management GUI. Manual intervention may be required to restore normal operation. Software versions 10.5, 11.5, 12.0, 12.5 are affected.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | unified_communications_manager | 10.5\(2.10000.5\) |
cisco | unified_communications_manager | 11.5\(1.10000.6\) |
cisco | unified_communications_manager | 12.0\(1.10000.10\) |
cisco | unified_communications_manager | 12.5\(1.10000.22\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-129 - Improper Validation of Array IndexThe product uses untrusted input when calculating or using an array index, but the product does not validate or incorrectly validates the index to ensure the index references a valid position within the array.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.