var-200402-0012
Vulnerability from variot
Cisco Personal Assistant 1.4(1) and 1.4(2) disables password authentication when "Allow Only Cisco CallManager Users" is enabled and the Corporate Directory settings refer to the directory service being used by Cisco CallManager, which allows remote attackers to gain access with a valid username. Cisco Systems Cisco Personal Assistant Exists in unspecified vulnerabilities.None. Remote attackers can exploit this vulnerability to change user parameters and configurations. This vulnerability exists only when the following conditions are true: 1. 2. This vulnerability does not affect users accessing Personal Assistant through the phone interface
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200402-0012", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "personal assistant", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.4\\(2\\)" }, { "model": "personal assistant", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "1.4\\(1\\)" }, { "model": "cisco personal assistant", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "1.4(2)" }, { "model": "cisco personal assistant", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "cisco personal assistant", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "1.4(1)" }, { "model": "personal assistant", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.4(2)" }, { "model": "personal assistant", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.4(1)" }, { "model": "personal assistant", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.3(4)" }, { "model": "personal assistant", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.3(3)" }, { "model": "personal assistant", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.3(2)" }, { "model": "personal assistant", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1.3(1)" } ], "sources": [ { "db": "BID", "id": "9384" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "CNNVD", "id": "CNNVD-200402-025" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Security Advisory", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-025" } ], "trust": 0.6 }, "cve": "CVE-2004-0044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2004-0044", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-8474", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-0044", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2004-0044", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200402-025", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-8474", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-8474" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "CNNVD", "id": "CNNVD-200402-025" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Personal Assistant 1.4(1) and 1.4(2) disables password authentication when \"Allow Only Cisco CallManager Users\" is enabled and the Corporate Directory settings refer to the directory service being used by Cisco CallManager, which allows remote attackers to gain access with a valid username. Cisco Systems Cisco Personal Assistant Exists in unspecified vulnerabilities.None. Remote attackers can exploit this vulnerability to change user parameters and configurations. This vulnerability exists only when the following conditions are true: 1. 2. This vulnerability does not affect users accessing Personal Assistant through the phone interface", "sources": [ { "db": "NVD", "id": "CVE-2004-0044" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "BID", "id": "9384" }, { "db": "VULHUB", "id": "VHN-8474" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0044", "trust": 3.3 }, { "db": "BID", "id": "9384", "trust": 2.8 }, { "db": "OSVDB", "id": "3430", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2004-000757", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200402-025", "trust": 0.7 }, { "db": "XF", "id": "14172", "trust": 0.6 }, { "db": "CISCO", "id": "20040108 CISCO PERSONAL ASSISTANT USER PASSWORD BYPASS VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-8474", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-8474" }, { "db": "BID", "id": "9384" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "CNNVD", "id": "CNNVD-200402-025" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "id": "VAR-200402-0012", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8474" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T15:20:18.082000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/9384" }, { "trust": 2.5, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040108-pa.shtml" }, { "trust": 1.9, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/14172" }, { "trust": 1.7, "url": "http://www.osvdb.org/3430" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0044" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/14172" } ], "sources": [ { "db": "VULHUB", "id": "VHN-8474" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "CNNVD", "id": "CNNVD-200402-025" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-8474" }, { "db": "BID", "id": "9384" }, { "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "db": "CNNVD", "id": "CNNVD-200402-025" }, { "db": "NVD", "id": "CVE-2004-0044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-02-03T00:00:00", "db": "VULHUB", "id": "VHN-8474" }, { "date": "2004-01-08T00:00:00", "db": "BID", "id": "9384" }, { "date": "2024-05-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "date": "2004-01-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-025" }, { "date": "2004-02-03T05:00:00", "db": "NVD", "id": "CVE-2004-0044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-10T00:00:00", "db": "VULHUB", "id": "VHN-8474" }, { "date": "2004-01-08T00:00:00", "db": "BID", "id": "9384" }, { "date": "2024-05-29T05:30:00", "db": "JVNDB", "id": "JVNDB-2004-000757" }, { "date": "2005-10-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200402-025" }, { "date": "2017-10-10T01:30:16.640000", "db": "NVD", "id": "CVE-2004-0044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-025" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Systems \u00a0Cisco\u00a0Personal\u00a0Assistant\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000757" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200402-025" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…