Cisco Unity Remote Administration Authentication Bypass (cisco-sa-20081008-unity)

medium Nessus Plugin ID 70170
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 4.2

Synopsis

The remote host has software installed that is affected by an authentication bypass vulnerability.

Description

According to its self-reported version number, the installation of Cisco Unity on the remote host may be affected by an authentication bypass vulnerability.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Additionally, the coarse nature of the version information Nessus gathered is not enough to confirm that the application is vulnerable, only that it might be affected.

Solution

Upgrade to 4.2.1ES161 / 5.0ES53 / 7.0ES8 or later.

See Also

https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-20081008-unity.html

Plugin Details

Severity: Medium

ID: 70170

File Name: cisco-sa-20081008-unity.nasl

Version: 1.9

Type: local

Agent: windows

Family: Windows

Published: 9/27/2013

Updated: 11/15/2018

Dependencies: cisco_unity_installed.nasl

Risk Information

Risk Factor: Medium

VPR Score: 4.2

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:unity

Required KB Items: SMB/Cisco_Unity/Installed

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2008

Vulnerability Publication Date: 10/8/2008

Reference Information

CVE: CVE-2008-3814

BID: 31638

CISCO-BUG-ID: CSCsr86943

CISCO-SA: cisco-sa-20081008-unity

CWE: 287