Cisco Unified Communications Manager TLS SAN Field MitM (CSCuq86376)

medium Nessus Plugin ID 80283

Synopsis

The remote device is affected by a security bypass vulnerability.

Description

According to its self-reported version, the remote Cisco Unified Communications Manager (CUCM) device is affected by a security bypass vulnerability due to improper validation of the SAN field in TLS certificates. A remote attacker can impersonate a Cisco TelePresense Video Communication Server (VCS) core device to perform man-in-the-middle (MitM) attacks.

Solution

Apply the relevant patch referenced in the Cisco bug advisory.

See Also

http://www.nessus.org/u?4cf7ec63

https://tools.cisco.com/security/center/viewAlert.x?alertId=36381

Plugin Details

Severity: Medium

ID: 80283

File Name: cisco_cucm_CSCuq86376.nasl

Version: 1.7

Type: combined

Family: CISCO

Published: 12/29/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:cisco:unified_communications_manager

Required KB Items: Host/Cisco/CUCM/Version, Host/Cisco/CUCM/Version_Display

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2014

Vulnerability Publication Date: 11/10/2014

Reference Information

CVE: CVE-2014-7991

BID: 71013

CISCO-BUG-ID: CSCuq86376