==================================================================== CERT-Renater Note d'Information No. 2018/VULN196 _____________________________________________________________________ DATE : 07/06/2018 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Cisco Meeting Server. ===================================================================== https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id _____________________________________________________________________ Cisco Security Advisory: Cisco Meeting Server Information Disclosure Vulnerability Advisory ID: cisco-sa-20180606-cms-id Revision: 1.0 For Public Release: 2018 June 6 16:00 GMT Last Updated: 2018 June 6 16:00 GMT CVE ID(s): CVE-2018-0263 CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N +--------------------------------------------------------------------- Summary ======= A vulnerability in Cisco Meeting Server (CMS) could allow an unauthenticated, adjacent attacker to access services running on internal device interfaces of an affected system. The vulnerability is due to incorrect default configuration of the device, which can expose internal interfaces and ports on the external interface of the system. A successful exploit could allow the attacker to gain unauthenticated access to configuration and database files and sensitive meeting information on an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id"] =============================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + =============================================================== --------------030603060509020809060907
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id_____________________________________________________________________
Cisco Security Advisory: Cisco Meeting Server Information Disclosure Vulnerability Advisory ID: cisco-sa-20180606-cms-id Revision: 1.0 For Public Release: 2018 June 6 16:00 GMT Last Updated: 2018 June 6 16:00 GMT CVE ID(s): CVE-2018-0263 CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N +--------------------------------------------------------------------- Summary ======= A vulnerability in Cisco Meeting Server (CMS) could allow an unauthenticated, adjacent attacker to access services running on internal device interfaces of an affected system. The vulnerability is due to incorrect default configuration of the device, which can expose internal interfaces and ports on the external interface of the system. A successful exploit could allow the attacker to gain unauthenticated access to configuration and database files and sensitive meeting information on an affected system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-cms-id"]