CVE-2017-12286
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the web interface of Cisco Jabber could allow an authenticated, local attacker to retrieve user profile information from the affected software, which could lead to the disclosure of confidential information. The vulnerability is due to a lack of input and validation checks in the affected software. An attacker could exploit this vulnerability by authenticating locally to an affected system and then issuing specific commands to the affected software. A successful exploit could allow the attacker to view all profile information for a user instead of only certain Jabber parameters that should be visible. This vulnerability affects all releases of Cisco Jabber prior to Release 1.9.31. Cisco Bug IDs: CSCve52418.
Una vulnerabilidad en la interfaz web de Cisco Jabber podría permitir que un atacante local autenticado recupere información del perfil de usuario del software afectado, lo que podría dar lugar a la revelación de información confidencial. Esta vulnerabilidad se debe una la falta de comprobaciones de entradas y validaciones en el software afectado. Un atacante podría explotar esta vulnerabilidad autenticándose de manera local en el sistema afectado y enviando entonces comandos específicos al software afectado. Un exploit con éxito podría permitir que el atacante visualizase toda la información del perfil donde solo deberían ser visibles ciertos parámetros de Jabber. Esta vulnerabilidad afecta a todas las distribuciones de Cisco Jabber anteriores a la distribución 1.9.31. Cisco Bug IDs: CSCve52418.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-03 CVE Reserved
- 2017-10-19 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/101515 | Third Party Advisory | |
http://www.securitytracker.com/id/1039625 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171018-jab1 | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Jabber Search vendor "Cisco" for product "Jabber" | 1.9.30 Search vendor "Cisco" for product "Jabber" and version "1.9.30" | windows |
Affected
| ||||||
Cisco Search vendor "Cisco" | Webex Meeting Center Search vendor "Cisco" for product "Webex Meeting Center" | 1.9.26 Search vendor "Cisco" for product "Webex Meeting Center" and version "1.9.26" | - |
Affected
|