cnvd-2022-44705
Vulnerability from cnvd

Title: Cisco Unified CM和Unified CM SME跨站请求伪造漏洞

Description:

Cisco Unified Communications Manager是美国思科(Cisco)公司的一款统一通信系统中的呼叫处理组件。该组件提供了一种可扩展、可分布和高可用的企业IP电话呼叫处理解决方案。Unified Communications Manager Session Management Edition是Unified Communications Manager的会话管理版。

Cisco Unified CM和Unified CM SME存在跨站请求伪造漏洞,攻击者可利用该漏洞通过诱使界面用户单击恶意链接来以受影响用户的权限级别执行任意操作。

Severity:

Patch Name: Cisco Unified CM和Unified CM SME跨站请求伪造漏洞的补丁

Patch Description:

Cisco Unified Communications Manager是美国思科(Cisco)公司的一款统一通信系统中的呼叫处理组件。该组件提供了一种可扩展、可分布和高可用的企业IP电话呼叫处理解决方案。Unified Communications Manager Session Management Edition是Unified Communications Manager的会话管理版。

Cisco Unified CM和Unified CM SME存在跨站请求伪造漏洞,攻击者可利用该漏洞通过诱使界面用户单击恶意链接来以受影响用户的权限级别执行任意操作。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-jrKP4eNT

Reference: https://vigilance.fr/vulnerability/Cisco-Unified-Communications-Manager-Cross-Site-Request-Forgery-38121

Impacted products
Name
['Cisco Unified Communications Manager 12.5(1)', 'Cisco Unified Communications Manager <12.5(1)SU6', 'Cisco Unified Communications Manager 14', 'Cisco Unified Communications Manager <14SU1', 'Cisco Unified Communications Manager Session Management Edition 12.5(1)', 'Cisco Unified Communications Manager Session Management Edition <12.5(1)SU6', 'Cisco Unified Communications Manager Session Management Edition 14', 'Cisco Unified Communications Manager Session Management Edition <14SU1']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-20787",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-20787"
    }
  },
  "description": "Cisco Unified Communications Manager\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7edf\u4e00\u901a\u4fe1\u7cfb\u7edf\u4e2d\u7684\u547c\u53eb\u5904\u7406\u7ec4\u4ef6\u3002\u8be5\u7ec4\u4ef6\u63d0\u4f9b\u4e86\u4e00\u79cd\u53ef\u6269\u5c55\u3001\u53ef\u5206\u5e03\u548c\u9ad8\u53ef\u7528\u7684\u4f01\u4e1aIP\u7535\u8bdd\u547c\u53eb\u5904\u7406\u89e3\u51b3\u65b9\u6848\u3002Unified Communications Manager Session Management Edition\u662fUnified Communications Manager\u7684\u4f1a\u8bdd\u7ba1\u7406\u7248\u3002\n\nCisco Unified CM\u548cUnified CM SME\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u8bf1\u4f7f\u754c\u9762\u7528\u6237\u5355\u51fb\u6076\u610f\u94fe\u63a5\u6765\u4ee5\u53d7\u5f71\u54cd\u7528\u6237\u7684\u6743\u9650\u7ea7\u522b\u6267\u884c\u4efb\u610f\u64cd\u4f5c\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucm-csrf-jrKP4eNT",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-44705",
  "openTime": "2022-06-13",
  "patchDescription": "Cisco Unified Communications Manager\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u7edf\u4e00\u901a\u4fe1\u7cfb\u7edf\u4e2d\u7684\u547c\u53eb\u5904\u7406\u7ec4\u4ef6\u3002\u8be5\u7ec4\u4ef6\u63d0\u4f9b\u4e86\u4e00\u79cd\u53ef\u6269\u5c55\u3001\u53ef\u5206\u5e03\u548c\u9ad8\u53ef\u7528\u7684\u4f01\u4e1aIP\u7535\u8bdd\u547c\u53eb\u5904\u7406\u89e3\u51b3\u65b9\u6848\u3002Unified Communications Manager Session Management Edition\u662fUnified Communications Manager\u7684\u4f1a\u8bdd\u7ba1\u7406\u7248\u3002\r\n\r\nCisco Unified CM\u548cUnified CM SME\u5b58\u5728\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u901a\u8fc7\u8bf1\u4f7f\u754c\u9762\u7528\u6237\u5355\u51fb\u6076\u610f\u94fe\u63a5\u6765\u4ee5\u53d7\u5f71\u54cd\u7528\u6237\u7684\u6743\u9650\u7ea7\u522b\u6267\u884c\u4efb\u610f\u64cd\u4f5c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco Unified CM\u548cUnified CM SME\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco Unified Communications Manager 12.5(1)",
      "Cisco Unified Communications Manager \u003c12.5(1)SU6",
      "Cisco Unified Communications Manager 14",
      "Cisco Unified Communications Manager \u003c14SU1",
      "Cisco Unified Communications Manager Session Management Edition 12.5(1)",
      "Cisco Unified Communications Manager Session Management Edition \u003c12.5(1)SU6",
      "Cisco Unified Communications Manager Session Management Edition 14",
      "Cisco Unified Communications Manager Session Management Edition \u003c14SU1"
    ]
  },
  "referenceLink": "https://vigilance.fr/vulnerability/Cisco-Unified-Communications-Manager-Cross-Site-Request-Forgery-38121",
  "serverity": "\u4e2d",
  "submitTime": "2022-04-22",
  "title": "Cisco Unified CM\u548cUnified CM SME\u8de8\u7ad9\u8bf7\u6c42\u4f2a\u9020\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…