// For flags

CVE-2020-3193

Cisco Prime Collaboration Provisioning Information Disclosure Vulnerability

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability in the web-based management interface of Cisco Prime Collaboration Provisioning could allow an unauthenticated, remote attacker to obtain sensitive information about an affected device. The vulnerability exists because replies from the web-based management interface include unnecessary server information. An attacker could exploit this vulnerability by inspecting replies received from the web-based management interface. A successful exploit could allow the attacker to obtain details about the operating system, including the web server version that is running on the device, which could be used to perform further attacks.

Una vulnerabilidad en la interfaz de administración basada en web de Cisco Prime Collaboration Provisioning, podría permitir a un atacante remoto no autenticado obtener información confidencial sobre un dispositivo afectado. La vulnerabilidad se presenta porque las respuestas de la interfaz de administración basada en web incluyen información del servidor innecesaria. Un atacante podría explotar esta vulnerabilidad mediante la inspección de las respuestas recibidas de la interfaz de administración basada en web. Una explotación con éxito podría permitir al atacante obtener detalles sobre el sistema operativo, incluyendo la versión del servidor web que se ejecuta en el dispositivo, lo que podría ser usado para llevar a cabo más ataques.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-03-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
< 12.6
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version " < 12.6"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
12.6
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "12.6"
-
Affected
Cisco
Search vendor "Cisco"
Prime Collaboration Provisioning
Search vendor "Cisco" for product "Prime Collaboration Provisioning"
12.6
Search vendor "Cisco" for product "Prime Collaboration Provisioning" and version "12.6"
service_update1
Affected