The Remote Mobile Access Subsystem in Cisco Unified Communications Manager (CM) 10.0(1) and earlier does not properly validate the Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof VCS core devices via a crafted certificate issued by a legitimate Certification Authority, aka Bug ID CSCuq86376.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/62267 - | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7991 - Vendor Advisory | |
References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=36381 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/71013 - | |
References | () http://www.securitytracker.com/id/1031181 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/98574 - |
Information
Published : 2014-11-14 00:59
Updated : 2024-11-21 02:18
NVD link : CVE-2014-7991
Mitre link : CVE-2014-7991
CVE.ORG link : CVE-2014-7991
JSON object : View
Products Affected
cisco
- unified_communications_manager
CWE
CWE-310
Cryptographic Issues