Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (VoIP/Phone/FAX)  >   Cisco Unity Vendors:   Cisco
Cisco Unity Express Lets Remote Authenticated Users Gain Administrative Privileges
SecurityTracker Alert ID:  1016015
SecurityTracker URL:
CVE Reference:   CVE-2006-2166   (Links to External Site)
Updated:  Aug 15 2009
Original Entry Date:  May 2 2006
Impact:   User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Cisco Unity Express only; prior to 2.3(1)
Description:   A vulnerability was reported in Cisco Unity Express. A remote authenticated user may be able to gain administrative privileges on the target system.

A remote authenticated user can exploit a flaw via the HTTP management interface and change the password for a target user if the target user's password is marked as expired. If the target user is an administrator, the remote authenticated user can gain administrative privileges.

This may allow the remote authenticated user to obtain voice mail messages or modify automated attendant messages.

Any Cisco Unity Express Advanced Integration Module (AIM) or Network Module (NM) running versions prior to 2.3(1) is vulnerable.

Cisco Unity is not affected.

Cisco has assigned Bug ID CSCsd50387 to this vulnerability.

Xu He and Keith Vaughan of the Bank of America Application Assessment Team discovered this vulnerability.

Impact:   A remote authenticated user may be able to gain the privileges of a target user, potentially including an administrative user.
Solution:   The vendor has issued a fixed version (2.3(1)).

The Cisco advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC