2 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability in the Redis implementation used by the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software could allow an unauthenticated, remote attacker to modify key-value pairs for short-lived events stored by the Redis server. The vulnerability is due to improper authentication when accessing the Redis server. An unauthenticated attacker could exploit this vulnerability by modifying key-value pairs stored within the Redis server database. An exploit could allow the attacker to reduce the efficiency of the Cisco Policy Suite for Mobile and Cisco Policy Suite Diameter Routing Agent software. Una vulnerabilidad en la implementación Redis, utilizada por los software Cisco Policy Suite for Mobile y Cisco Policy Suite Diameter Routing Agent, podría permitir un usuario remoto sin autenticar modificar pares de valores de clave para eventos de corta duración almacenados por el servidor Redis. • http://www.securityfocus.com/bid/106547 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-redis • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.3EPSS: 0%CPEs: 6EXPL: 0

The password-management administration component in Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att, and 7.5.0 allows remote attackers to bypass intended RBAC restrictions and read unspecified data via unknown vectors, aka Bug ID CSCut85211. El componente de administración de gestión de contraseñas en Cisco Policy Suite (CPS) 7.0.1.3, 7.0.2, 7.0.2-att, 7.0.3-att, 7.0.4-att y 7.5.0 permite a atacantes remotos eludir las restricciones RBAC destinadas y leer datos no especificados a través de vectores desconocidos, también conocido como Bug ID CSCut85211. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-psc • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •