You are here
Home > Preporuke > Ranjivost Cisco Video Surveillance Manager softvera

Ranjivost Cisco Video Surveillance Manager softvera

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Video Surveillance Manager Web-Based Management Interface Information Disclosure Vulnerability

Advisory ID: cisco-sa-20190515-cvsm

Revision: 1.0

For Public Release: 2019 May 15 16:00 GMT

Last Updated: 2019 May 15 16:00 GMT

CVE ID(s): CVE-2019-1717

CVSS Score v(3): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

+———————————————————————

Summary

=======

A vulnerability in the web-based management interface of Cisco Video Surveillance Manager could allow an unauthenticated, remote attacker to access sensitive information.

The vulnerability is due to improper validation of parameters handled by the web-based management interface. An attacker could exploit this vulnerability by sending malicious requests to an affected component. A successful exploit could allow the attacker to download arbitrary files from the affected device, which could contain sensitive information.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-cvsm”]

—–BEGIN PGP SIGNATURE—–
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=czRC
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa 389-ds

Otkriveni su sigurnosni nedostaci u programskom paketu 389-ds za operacijski sustav openSUSE. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS...

Close