ID CVE-2004-1322
Summary Cisco Unity 2.x, 3.x, and 4.x, when integrated with Microsoft Exchange, has several hard coded usernames and passwords, which allows remote attackers to gain unauthorized access and change configuration settings or read outgoing or incoming e-mail messages.
References
Vulnerable Configurations
  • cpe:2.3:h:cisco:unity_server:2.0:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.0:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:2.1:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.1:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:2.2:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.2:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:2.3:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.3:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:2.4:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.4:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:2.46:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:2.46:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:3.0:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:3.0:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:3.1:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:3.1:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:3.2:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:3.2:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:3.3:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:3.3:*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:unity_server:4.0:*:*:*:*:*:*:*
    cpe:2.3:h:cisco:unity_server:4.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 11954
ciac P-060
cisco 20041215 Cisco Unity Integrated with Exchange Has Default Passwords
xf cisco-unity-exchange-default-accounts(18489)
Last major update 11-07-2017 - 01:30
Published 15-12-2004 - 05:00
Last modified 11-07-2017 - 01:30
Back to Top