Cisco Unified Communications Manager TLS SAN Field MitM (CSCuq86376)

medium Nessus Plugin ID 80283


The remote device is affected by a security bypass vulnerability.


According to its self-reported version, the remote Cisco Unified Communications Manager (CUCM) device is affected by a security bypass vulnerability due to improper validation of the SAN field in TLS certificates. A remote attacker can impersonate a Cisco TelePresense Video Communication Server (VCS) core device to perform man-in-the-middle (MitM) attacks.


Apply the relevant patch referenced in the Cisco bug advisory.

See Also

Plugin Details

Severity: Medium

ID: 80283

File Name: cisco_cucm_CSCuq86376.nasl

Version: 1.7

Type: combined

Family: CISCO

Published: 12/29/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:unified_communications_manager

Required KB Items: Host/Cisco/CUCM/Version, Host/Cisco/CUCM/Version_Display

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2014

Vulnerability Publication Date: 11/10/2014

Reference Information

CVE: CVE-2014-7991

BID: 71013