CVE-2009-0632

Severity

90%

Complexity

80%

Confidentiality

165%

Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml "Impact Successful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication."

The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.

Per: http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml "Impact Successful exploitation of this vulnerability may allow an attacker to intercept user credentials that allow the attacker to escalate their privilege level and obtain complete administrative access to a vulnerable Cisco Unified Communications Manager system. If integrated with an external directory service, the intercepted user credentials may allow an attacker to gain access to additional systems configured to use the directory service for authentication."

CVSS 2.0 Base Score 9. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:S/C:C/I:C/A:C).

Overview

Type

Cisco Unified Communications Manager

First reported 16 years ago

2009-03-12 15:20:00

Last updated 7 years ago

2017-08-17 01:29:00

Affected Software

Cisco Unified Communications Manager 4.1

4.1

Cisco Unified Communications Manager 4.2

4.2

Cisco Unified Communications Manager 4.2(3)SR3

4.2\(3\)sr3

Cisco Unified Communications Manager 4.2(3)SR4

4.2\(3\)sr4

Cisco Unified Communications Manager 4.3

4.3

Cisco Unified Communications Manager 4.3(2)

4.3\(2\)

Cisco Unified Communications Manager 4.3(2)SR1

4.3\(2\)sr1

Cisco Unified Communications Manager 5.0

5.0

Cisco Unified Communications Manager 5.1(1)

5.1\(1\)

Cisco Unified Communications Manager 5.1(2)

5.1\(2\)

Cisco Unified Communications Manager 5.1(2a)

5.1\(2a\)

Cisco Unified Communications Manager 5.1(2b)

5.1\(2b\)

Cisco Unified Communications Manager 5.1(3)

5.1\(3\)

Cisco Unified Communications Manager 5.1(3a)

5.1\(3a\)

Cisco Unified Communications Manager 5.1(3c)

5.1\(3c\)

Cisco Unified Communications Manager 5.1(3d)

5.1\(3d\)

Cisco Unified Communications Manager 6.0

6.0

Cisco Unified Communications Manager 6.0(1)

6.0\(1\)

Cisco Unified Communications Manager 6.0(1a)

6.0\(1a\)

Cisco Unified Communications Manager 6.1(1)

6.1\(1\)

Cisco Unified Communications Manager 6.1(1a)

6.1\(1a\)

Cisco Unified Communications Manager 6.1(2)

6.1\(2\)

Cisco Unified Communications Manager 6.1(2)su1

6.1\(2\)su1

Cisco Unified Communications Manager 6.1(3)

6.1\(3\)

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.